x Close
B2B File Sharing Blog
Secure file sharing software information, file sharing trends and announcements.
CMMC Cyber and Data Security DFARS GOVFTP Cloud Government Compliance ITAR NIST Supply Chain
The United States of America is increasing attention on cybersecurity to ensure the prosperity of the American people. Public and private entities must secure systems, and networks from adversaries with malicious purpose. In this effort to secure Federal networks, one of the areas of focus for the government is the Federal Supply Chain and strengthening the security of United States Government contracting systems. The global nature of the Internet allows all countries to participate in communication, commerce, and free exchange of ideas – allowing for true prosperity. Access to something as powerful as the Internet presents opportunities for outside nations to conduct espionage, steal intellectual properties, cybercrimes, and remotely attack critical infrastructure.
Share
Cyber and Data Security Government Compliance
AMRDEC SAFE was the leading solution in the government file-sharing space for a long time. However, given the increasing demands of security and file capacity, AMRDEC was replaced with a new solution called DoD SAFE
Share
Are you trying to select a new file sharing solution, but you have a few questions first? Explore these common questions about file sharing solutions and find out their answers.
Cyber and Data Security Government Compliance
The aerospace industry has grown exponentially in recent memory. The transport of goods and services has become a major player in the global economy. But, with that growth has come increased regulation. In particular, regulations in data and file sharing led to the creation of ITAR, International Traffic in Arms Regulations.
Share
Cyber and Data Security File Sharing Best Practices
Businesses all over the world are adjusting how employees work due to the coronavirus pandemic. One recent study reported that 90% of IT professionals believe remote workers are not secure. At the same time, over 70% think remote staff poses a greater risk than onsite employees.
Share
Cyber and Data Security Government Compliance
Imagine you are the pilot of a plane, carrying delicate cargo – maybe the most important cargo: human passengers. Suddenly, your plane’s systems are infiltrated by a hacker with nefarious motives and you no longer have GPS or communication connection. Panic begins to set in as you struggle to maintain the safety and security of the aircraft.
Share
Cyber and Data Security Government Compliance
At FTP Today, we get asked a lot about aerospace cybersecurity. From who regulates aerospace to how to be compliant in the industry, it is critical to understand how the industry works.
Share
Cyber and Data Security Secure File Sharing
When you think of user access security, you might think of traditional security measures, like submitting your username and password. While these basic security measures may have protected you in the past, they’re not quite strong enough to withstand advanced attacks from today’s hackers. Thus, many organizations are turning to SSH-key authentication to provide a greater level of security for SFTP solutions compared to traditional password measures. In this article, we’ll look at what SSH-Key Authentication entails, and how this security measure protects your data better than other options.
Share
Cyber and Data Security Government Compliance
Security breaches and cybersecurity attacks happen every day, making it imperative that organizations have the proper security controls in place. In addition to having your own security measures established and tested, you also need to ensure that every service provider you work with is up to your standards, especially a cloud service provider (CSP).
Share
Cyber and Data Security File Sharing Best Practices
No longer just a novel approach to office technology, BYOD (bring your own device) policies have become common practice in today’s workplaces. It’s easy to see why as we grow more dependent on smartphones, tablets, laptops, and other devices by the day.
Share
Cyber and Data Security Government Compliance
For so many organizations, especially government agencies, it can feel like compliance requirements are increasing each day. It can be a challenge to keep up with all the necessary requirements Cloud Service Providers must meet. FedRAMP is one such requirement.
Share