The Sharetru Blog

    Discover expert insights, practical tips, and the latest trends to optimize your file transfers.
    Subscribe to stay ahead of the curve, receive feature updates, and transform the way you manage and exchange files.

    Cyber and Data Security

    Cyber and Data Security

    SSH-Key vs. Password Authentication: Which is Better?

    When you think of user access security, you might think of traditional security... Read More
    File Sharing Best Practices

    One-Time Password (OTP) Authentication Methods – HOTP + TOTP

    The evolution of multi-factor authentication (MFA) is like that from the... Read More
    File Sharing Best Practices

    Understanding One-Time Password (OTP) Authentication Options

    Over the last few weeks, we have focused on authentication progressing through... Read More
    File Sharing Best Practices

    Data Retention 101: How Long to Keep Your Files? | Sharetru

    An Introduction to Data Retention "Data Retention" is a term that's used in... Read More
    Cyber and Data Security

    Secure Military File Sharing: Exploring DoD SAFE Alternatives

    The U.S. Department of Defense (DoD) manages an annual budget that stretches... Read More
    Cyber and Data Security

    6 Steps for Implementing the NIST Cybersecurity Framework

    Implementing the NIST Cybersecurity Framework is one of the best ways to ... Read More
    File Sharing Best Practices

    8 SFTP Best Practices for Your Business

    You’ve likely heard of FTP as a protocol for sharing files and information... Read More
    Cyber and Data Security

    What is FTP? Understanding File Transfer Protocol (FTP)

    FTP, also known as file transfer protocol, is a process that organizations can... Read More
    Cyber and Data Security

    The Difference Between ATO and P-ATO FedRAMP Authorization

    For so many organizations, especially government agencies, it can feel like ... Read More