x Close

Get it Now

B2B File Sharing Blog

Secure file sharing software information, file sharing trends and announcements.

Blog Feature

Cyber and Data Security

Computer Security Tips for Employees

When it comes to cybersecurity for your organization, there are potential risks just about everywhere -- but there’s one that can be a real wildcard. We’re talking about your employees. In fact, anyone within your company could be opening up your business to dangerous, costly threats without even knowing it. And since one unexpected cyber attack has the power to bring your entire business to its knees, it’s essential to ensure that your data security policy includes effective strategies for mitigating the employee risk factor.

Read More

Blog Feature

Cyber and Data Security Government Compliance

Data Security Best Practices for ITAR Compliance

As the world around us continues to get more dangerous on a daily basis, maintaining compliance with governing bodies like ITAR becomes all the more important. Short for “International Traffic in Arms Regulations,” ITAR is a set of standards that deals with information security involving any parties that handle technical data related to the manufacturing, the exporting and a general involvement with defense articles or services. In other words, data files shared between the U.S Military and its military contractors.

Read More
Secure File Sharing

Get the answers to your secure file sharing questions!

Are you trying to select a new file sharing solution, but you have a few questions first? Explore these common questions about file sharing solutions and find out their answers.

Blog Feature

Cyber and Data Security

Why Use SSH-Key Authentication for SFTP Instead of Password Authentication?

If you're in the process of choosing a secure SFTP provider for your business, security in general is obviously one of your highest priorities. It isn't enough to just make all important files and other documents available to employees and clients at a moment's notice - you want to make sure that confidential information stays out of the hands of those with prying eyes at the same time. One of the single best ways to accomplish this is to use SSH-key authentication for SFTP instead of standard password authentication. This is something you'll want to look into for a wide range of different reasons.

Read More

Blog Feature

Cyber and Data Security Financial Compliance

Understanding PCI DSS Compliance for File Transfer

One of the best chances that businesses have to prevent a catastrophic (and costly) data breach involves making sure that they remain compliant in the digital age. Maintaining compliance means paying close attention to not only file security, but privacy at the same time. Understanding PCI DSS compliance for file transfer always involves keeping a few key things in mind.

Read More