x Close

Take a Tour

Secure File Sharing Blog

B2B File Sharing Blog

Secure file sharing software information, file sharing trends and announcements.

Blog Feature

Cyber and Data Security

What is the Biggest Cybersecurity or Data Threat?

If you’ve tuned into or read the news lately, you’ve probably seen a story about a data breach or a hacker gaining access to sensitive data. For companies that use sensitive data, cyber attacks should be a huge concern for your team, and something you’re actively striving to prevent. Here are four of the biggest cybersecurity threats your company might be up against, and find out what steps you can take to prevent these types of data breaches in the future.

Read More

Blog Feature

Cyber and Data Security

Actions and Procedures to Consider When Establishing a Data Security Policy

Does your company have a working and enforced data security policy? While you may have a few rules that you try to enforce here and there, it can be difficult to keep data safe without a comprehensive and coherent data security policy. As you’re coming up with the data security policy for your company, it’s important to keep a few key actions and procedures in mind. Explore the following actions and procedures that should be incorporated into your data security policy.

Read More
Secure File Sharing

Get the answers to your secure file sharing questions!

Are you trying to select a new file sharing solution, but you have a few questions first? Explore these common questions about file sharing solutions and find out their answers.

Blog Feature

Cyber and Data Security

5 Steps to Take if Malware Steals Your FTP Passwords

As the programs you use to protect your information get more sophisticated, so does the malware designed to steal from them. Malware, or malicious software, is used by hackers to gain authorized access to data. Malware has been around for a while – think computer viruses – but methods are growing more advanced each day. Now, hackers use stealthy methods like Trojan horse software designed to look like a legitimate website or ransomware which requires users to pay a ransom while hackers hold their data hostage. You’ve probably seen numerous articles talking at length about the different ways to secure your data and protect yourself and your company. But, what happens if the damage is already done? Whether you’re cleaning up from a malware attack or you just want to be prepared for the worst, you need to have an plan for what to do when a breach occurs.

Read More

Blog Feature

Cyber and Data Security

Key Components Needed in Your Data Security Policy

It doesn’t matter what kind of business you’re running, what industry you’re operating in or what size your company is, the truth is NO organization is completely safe from the danger of security breaches. Protecting your business from the threats that face your critical data and information is a crucial effort -- and one that must be shared by your entire company. Every individual with access to your systems is either part of the problem or part of the solution. To get everyone on board with helping to prevent harmful, costly data breaches, it is essential to develop a documented data security policy, one that encompasses all of the necessary components.

Read More

Blog Feature

Cyber and Data Security

Main Types of Computer Security Threats That Harm Your Company

No business is safe from the computer security threats that permeate today’s digital world. As the technology you implement to run your enterprise becomes more advanced, so do the cyber criminals trying to exploit your systems. It can be a frightening and overwhelming reality for companies of all sizes and in all types of industries. A single security breach has the potential to endanger your critical data assets, incur immense costs and even put you out of business. In the face of these risks, what is your company doing to defend itself?  

Read More

Blog Feature

Cyber and Data Security

Data Security Tips for Remote Workers

50% of U.S. workers have a job that’s compatible with at least partial telework, and approximately 20-25% say they work remotely at some frequency, according to the latest statistics from Global Workplace Analytics. To say that the telecommuting movement is poised to be a short-lived one would be an incredibly misinformed statement. In fact, 80-90% of the U.S. workforce say they would like to telework at least part time, and studies show that employees are away from their desk 50-60% of the time. The business world has become a mobile environment, and with this reality comes the inherent risk of data security challenges.

Read More