Overview
As one of the basic building blocks of information security, the CIA Triad is likewise a vital piece in establishing secure enterprise file transfers. In this post, we explain what the CIA Triad is and how you can apply it to your B2B data transfers.
Read More
Topics:
Secure File Transfer,
SFTP,
FTPS
When users attempt to connect to your Secure File Transfer Protocol (SFTP) server for the first time, they’ll see an alert indicating that their client doesn’t recognize the host it’s connecting to. The warning usually includes a line that shows a key fingerprint and a prompt that asks the user whether to proceed with the connection attempt or not. Here are two examples illustrating what we’re referring to.
Read More
Topics:
Secure File Transfer,
SFTP,
key fingerprint,
ssh,
authentication
Overview
Most US states now have their own data breach notification law. If your business operations involve the storage and transfer of personal information, there are a couple of things you ought to know to reduce the risks and bring down the costs of compliance.
Read More
Topics:
JSCAPE MFT,
Managed File Transfer,
Secure File Transfer
Overview
Will Brexit have a significant impact on data transfers involving personal information? While it's hard speculate what the impact will be, it could largely depend on the specific path UK chooses to take once its separation from the EU is finalized.
Read More
Topics:
News,
JSCAPE MFT,
Secure File Transfer
Overview
Results from Ponemon's 2016 Cost of Data Breach Study show that the price of these incidents continues to rise and that it has now breached the $4 Million mark. Another paper published by Deloitte even talks about hidden costs that far exceed what most businesses normally take into account. While these reports paint an alarming picture on the state of data security, we managed to extract from these papers key factors that can help businesses mitigate the risks.
Read More
Topics:
News,
JSCAPE MFT,
Secure File Transfer
Overview
Windows, including Windows 10, lacks a built-in SFTP client, making it challenging for users to securely transfer files to an SFTP server. This post guides Windows users on setting up an alternative solution for secure file transfers.
Read More
Topics:
File Transfer Clients,
Secure File Transfer,
SFTP,
ssh,
Windows SFTP Client,
sftp server
Overview
Last week, while responding to one of the tickets at our HelpDesk, I noticed that the port number used wasn't standard. While we encounter this quite often, the use of non-standard ports is one of those practices where many IT folks have opposing views.
On one side you have those who consider the use of non-standard ports a form of "security through obscurity" and hence discourage it. On the other, you have those who actually recommend it. Clearly, the topic makes for an interesting discussion, so here we are to discuss it.
Read More
Topics:
Secure File Transfer
Overview
Although you can run AS2 over HTTPS in order to provide encryption, authentication, data integrity, and non-repudiation to your EDI exchanges, it's not necessary. You can still get the same level of protection if you use AS2's built-in support for encryption and digital signatures. We already talked about AS2 encryption in a previous post, so this time, let's focus on digital signatures.
Read More
Topics:
JSCAPE MFT,
Managed File Transfer,
Secure File Transfer,
AS2
Overview
Over the last few months, we've been receiving a growing number of inquiries on how to enable support for SHA2 certificates in JSCAPE MFT Server. We later learned that the intention was not just to accommodate SHA2-signed certs but to actually replace SHA1-signed certs with them.In this post, we explain why people are moving from SHA1 to SHA2 and why you need to do so as well.
Read More
Topics:
Secure File Transfer,
FTPS
Overview
Some organizations that deal with exceptionally sensitive information need to employ very stringent access restrictions to their internal networks. While a DMZ consisting of firewalls and reverse proxies can, in most cases, meet such requirements, providing network services from the internal network to external clients while also prohibiting inbound connections can be quite challenging. This little reverse proxy enhancement can simplify things.
Read More
Topics:
JSCAPE MFT,
Secure File Transfer,
Reverse Proxy