Try it for yourself
Start my FREE trial now

How Do I Know if G-Cloud Services are Secure Enough For My Data?

Posted on April 16, 2015 by Georgina Park |Leave a comment|

The G-Cloud framework allows public sector bodies to access IT and computing solutions on the cloud, without having to invest in expensive, inflexible physical hardware.

To ensure that IT departments in the public sector can share data completely safely, G-Cloud services come in three different levels. These levels are:

Continue reading →

Two Factor Authentication – What’s it all about?

Posted on April 15, 2015 by Georgina Park |Leave a comment|

Secure data transfer

In today’s world, secure data transfer is becoming more and more important. Two Factor Authentication (or as the IT-Pros know it…2FA) is becoming a much more common security requirement.

Most online security procedures require a simple username and password. Lots of users use weak passwords at home. For example the dogs name followed by 2000 e.g. Rufus2000. There is a UK Government campaign advertising preventing this and encourage people to use hard to hack passwords.

Continue reading →

10 Top Tips for Secure File Transfer

Posted on April 13, 2015 by Georgina Park |Leave a comment|

Secure file transfer is an essential requirement for most industries. But how can you optimise your secure file transfer to get the most out of it? Read our 10 tips below:

Continue reading →

How Does Tokenisation Reduce PCI Scope?

Posted on April 13, 2015 by Georgina Park |Leave a comment|

Looking to reduce your PCI scope? Tokenisation is an encryption method that’s used by IT teams across the world to safely handle customer data and safeguard PCI compliance.

Continue reading →

Small Business Guide: The Great Firewall of China’s Pros and Cons

Posted on April 12, 2015 by Georgina Park |Leave a comment|

If you’re running a business, dealing with China can be a very attractive prospect. After all, the Eastern giant is the world’s largest purchasing economy and has proved largely recession-proof, with growth rates averaging 10% year-on-year since 1980.

Nevertheless, there’s one major concern for businesses: the Great Firewall of China. The uncertainty around the ‘Golden Shield’ project can dissuade many companies from expanding into the world’s second economic superpower.

Continue reading →

5 Simple Ways You Can Reduce Your Organisation’s PCI Scope

Posted on April 11, 2015 by Georgina Park |Leave a comment|

Reducing an organisation’s PCI scope should be a major priority for IT managers. Let’s take an in-depth look at PCI DSS scope reduction:

Continue reading →

China Monthly Roundup – April 2015

Posted on April 10, 2015 by Georgina Park |Leave a comment|

Another month over and a huge amount of changes have been made to technology in China. Here’s the round up for the month:

Continue reading →

Is Your Business Still PCI Compliant?

Posted on April 09, 2015 by Georgina Park |Leave a comment|

Earlier this year, an update to PCI compliance (version 3.0) was rolled out, bringing with it a host of changes that businesses needed to adapt to in order to maintain compliance. Version 3.0 focuses very strongly on security rather than best practice, meaning that many companies may no longer be PCI compliant. Often this can happen without anybody realising it.

Continue reading →

PCI DSS 3.0: Did Encryption Go Far Enough?

Posted on April 03, 2015 by Georgina Park |Leave a comment|

In January 2015, PCI DSS 3.0 was brought into effect in order to help bring about vital changes but many sources argue that it didn’t take encryption far enough.

Is this true? Maytech takes a look at what changes 3.0 has brought with it and whether it will create a significant impact.

Continue reading →

How Speed Makes Maytech a Trusted China File Sharing Partner

Posted on April 01, 2015 by Georgina Park |Leave a comment|

If your organisation works in and with China, you’ll know that organisations can face a number of different problems – many of which we discussed in this blog.

Continue reading →

Search

Subscribe

How FTP-Stream Works

Click here to find more
cta_maytech_sidebanner_blue