x Close

Take a Tour
-# Vars

Secure File Sharing Blog

B2B File Sharing Blog

Secure file sharing software information, file sharing trends and announcements.

Blog Feature

Announcements Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance ITAR Latest Features Secure File Sharing The Cloud

Drive Mapping: Everything You Need to Know

On more than one occasion, our clients have asked if it’s possible to map files directly to a computer drive from the FTP Today application, whether that be The FTP Cloud or the GOVFTP Cloud. The process of this is called ‘drive mapping’ throughout the industry, and it is simple to accomplish. Today, we’re going to walk you through how drive mapping works, options for drive mapping, and finally, how to do so with FTP Today. 

Read More

Blog Feature

Announcements Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance ITAR Latest Features Secure File Sharing The Cloud

What is an API (Application Programmable Interface)? The Basics & Benefits

Recently, FTP Today launched a new feature as part of our platform called an Application Programming Interface, otherwise known as an API. Don’t be intimidated by the name! An API is useful for many things, and if your organization has access, it’s something you should take advantage of. This blog is meant to give an overview of what an API is and how it works.

Read More
Secure File Sharing

Get the answers to your secure file sharing questions!

Are you trying to select a new file sharing solution, but you have a few questions first? Explore these common questions about file sharing solutions and find out their answers.

Blog Feature

Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance ITAR Secure File Sharing The Cloud

Single Sign-On (SSO) Explained: What is SSO, How it Works, Why it Improves Security & More

In recent years, FTP Today has received many questions from our customer base regarding Single Sign-On, otherwise known as SSO. This blog is meant to educate the reader on definitions and use cases as the technology has become widely adopted across organizations of all sizes for administration and security purposes.

Read More

Blog Feature

FTP Solutions File Sharing Best Practices

A Comparison of Dedicated FTP Servers and Cloud FTP Hosting

When it comes to file sharing, nothing is more important than security. But when there are so many solutions on the market, it can be difficult to determine which option will best meet your needs.

Read More

Blog Feature

Cyber and Data Security File Sharing Best Practices

Cybersecurity Best Practices for Newly Remote Employees

Businesses all over the world are adjusting how employees work due to the coronavirus pandemic. One recent study reported that 90% of IT professionals believe remote workers are not secure. At the same time, over 70% think remote staff poses a greater risk than onsite employees. 

Read More

Blog Feature

Cyber and Data Security File Sharing Best Practices

How BYOD Is Affecting Your Business's File Security

No longer just a novel approach to office technology, BYOD (bring your own device) policies have become common practice in today’s workplaces. It’s easy to see why as we grow more dependent on smartphones, tablets, laptops, and other devices by the day. 

Read More

Blog Feature

File Sharing Best Practices Healthcare Compliance

How to Be HIPAA Compliant When Sharing Sensitive Files

Is your company subject to HIPAA compliance regulations? If you deal with healthcare data, the answer is yes. Maintaining HIPAA compliance is essential if you want to avoid steep fines, protect your business, and most importantly, protect the sensitive healthcare data belonging to your customers.

Read More

Blog Feature

File Sharing Best Practices

8 Types of Malware Attacks and How to Avoid Them

Malware is a threat to your business both from a monetary and a productivity perspective. It can compromise your secure data and bring your business to a screeching halt. Find out more about malware, eight common types of malware attacks to watch out for, and the steps you can take to mitigate the risks of malware.

Read More

Blog Feature

FTP Solutions File Sharing Best Practices

How Does an FTP Server Work and What are Its Benefits?

Using an FTP server is a common solution for businesses that want to keep their data safe. If you’re looking for the right option to maintain data security, a hosted FTP server could be the answer. Learn more about what FTP servers are, how they work, and how they can benefit your business. 

Read More

Blog Feature

File Sharing Best Practices

File Sharing Standards Your Team is Failing to Implement

Establishing file sharing standards within your organization creates the necessary security guidelines needed to keep your data protected. However, without the proper file sharing standards in place, your data could be at risk.

Read More