Try it for yourself

User Behaviours that Compromise Security

Posted on December 20, 2014 by Georgina Park |Leave a comment|

The IT team in any organisation are responsible for ensuring that all of the IT systems of the business are running correctly and that the data that is stored in these systems is protected.

If you are a member of an IT team, you have probably experienced user behaviours that explicitly compromise the very thing you’re tasked with protecting. The examples below are some customer anecdotes.

Continue reading →

Functionality to Streamline Services

Posted on December 18, 2014 by Georgina Park |Leave a comment|


Do you need to collect files and associated meta-data. Maybe you’re a printer and you need to collect files for printing along with the print requirements…or you could be an insurance company needing to collect photos and related information for claims. Whatever your data acquisition requirements, Maytech can help you.

Continue reading →

Robot Chores - The Machines That Want Our Jobs

Posted on December 07, 2014 by Georgina Park |Leave a comment|

There are already many instances of robots being used in manufacturing. However, they are almost exclusively used for repetitive tasks that don’t require logical thought. Crucially, most machines aren’t required to make any changes in their actions while they are carrying out their work.

But now a Ping-Pong playing robot has been unveiled in China that could soon revolutionise factories around the world.

Continue reading →

How to Keep Data Safe When Sharing on the Cloud

Posted on December 06, 2014 by Georgina Park |Leave a comment|

It makes sense that more and more companies are migrating to the cloud. It’s flexible, it’s simple and has fewer overheads. What’s more, although it’s not as fast as physical server storage, the cloud is getting increasingly rapid by the day.

It’s no surprise that Symantec recently found out that nearly half of all business data is stored on cloud networks.

But is the cloud safe? Continue reading →

Big Data and 1984 – Was George Orwell Right?

Posted on December 05, 2014 by Georgina Park |Leave a comment|








George Orwell’s dystopian novel Nineteen Eighty-Four hinted at a terrifying future for the human race. After nuclear war, millions of working-class proles are ruled heartlessly by Big Brother, the head of a totalitarian state who watches their every move.

Was Orwell right?

1984 was written just after the Second World War with the Cold War looming, but it remains just as thought provoking and prescient in the internet age where governments and businesses know more about us than they ever have before. Continue reading →

How to Ensure Your Business is PCI-DSS Compliant

Posted on December 05, 2014 by Georgina Park |Leave a comment|







Whether you’re a small independent retailer or in charge of an multinational bank’s IT department, anyone who handles credit and debit card information has to adhere to PCI-DSS.

What does PCI Compliant Mean?

PCI compliant means that a business adheres to the PCI DSS security standard when handling personal finance information. Continue reading →

Reflecting On Data Security In 2014

Posted on December 03, 2014 by Georgina Park |Leave a comment|

“Those who fail to learn from history are doomed to repeat it.” – George Santayana

As 2014 draws to a close, we thought now would be a good time to look back on the events of the year, and see what insights we could glean to prepare for 2015.

And not just because of the words of wisdom from Colonel Santayana.

Continue reading →

Why You Need To Encrypt Your Data

Posted on December 02, 2014 by Georgina Park |Leave a comment|

“In a perfect world I would be taller, you would be alive, and chickens would be able to cross the road without being the subject of a joke,” wrote author Suzanne Wright.

And to that list we would add...”and you wouldn’t have to worry about data breaches.”

Continue reading →

Dealing With Missing Data – Who Carries The Can?

Posted on December 01, 2014 by Georgina Park |Leave a comment|



Lost data can cause a whole host of problems for a business, so the last thing that you’ll want to hear is that your data has gone missing. Unfortunately, however, this is a problem that can occur and if it does, then you will want the situation to be rectified as soon as possible. This will probably require some contact with the company that takes care of your data, as you’ll want to establish the circumstances of the data being lost as quickly as possible.

Continue reading →

5 Problems With Sharing Data in China

Posted on November 30, 2014 by Georgina Park |Leave a comment|

Sharing files in China is problematic. Businesses of all shapes and sizes find it tough to send important data to and from Chinese locations.

Here are five reasons why:

The Great Firewall of China

Unlike most other countries, the Chinese government control the way that their citizens can use the internet. Words such as ‘dictatorship’, ‘Red terror’ or ‘Tiananmen Square massacre’ are banned. Many Western sites such as Google, Facebook and the BBC are blocked outright and any information that’s deemed to be threatening is removed from websites.
What’s more, it also prevents Chinese websites from being accessed outside of The People’s Republic. Not only does this cause problems for the Chinese population, but it also makes it hard for businesses to share data to and from China.
Continue reading →



How FTP-Stream Works

Click here to find more