Try it for yourself
Start my FREE trial now

EU and US on Collision Course Over Data Privacy

Posted on May 21, 2015 by Georgina Park |Leave a comment|

The European Union is collating a new data privacy regime that could change the business landscape in Europe – particularly for US companies.


After the Snowden disclosures revealed the extent to which American companies collected the personal data of customers, new legislation is being mooted to unite all EU countries with legislation that requires Europeans to explicitly agree to the collection of their information.

Continue reading →

PAN Government Accredited File Sharing

Posted on May 19, 2015 by Georgina Park |Leave a comment|

Maytech has highlighted their commitment to data security in the government sector by being awarded PAN Government Accreditation in April 2015 for their secure data transfer products. This covers UK Government data that is OFFICIAL and OFFICIAL-SENSITIVE connected over the internet. It will provide confidence to purchasers and SiROs around the security of Maytech’s dedicated service for the secure file sharing of data with third parties outside of government networks.

Continue reading →

The Business Case For Being Secure

Posted on May 18, 2015 by Georgina Park |Leave a comment|

For businesses everywhere, data security and potential cybercrime are a major concern. Recent news stories have shown that the level of threat has increased significantly over the last few years and the trend only looks set to continue.

Enhancing your data security measures and creating an action plan to deal with any potential threat should be one of your main priorities. After all, the risk to your business otherwise is far too great.

Continue reading →

Staying on the Right Side of Data Residency in a Globalised World

Posted on May 16, 2015 by Georgina Park |Leave a comment|

It’s a quirk of the globalised, constantly-connected world that data residency is still of utmost importance to businesses and governments. Although data can be viewed and transmitted across continents and from hard-to-reach locations, there are numerous laws that dictate where this information can actually be stored.

Continue reading →

How Credit Companies Use Social Credit Scoring

Posted on May 15, 2015 by Georgina Park |Leave a comment|

(Pixabay)

All across the world, it’s become common practice for employers to use social media to get a more rounded, realistic picture of potential employees. The data available on Facebook, Twitter, Instagram and LinkedIn can provide a wealth of information concerning a person’s character, so much so that now, perhaps unsurprisingly, financial institutions are also beginning to take advantage of it.

According to EuroMoney, an increasing number of independent lenders are gaining traction in the loans industry thanks to the use of social media to analyse credit risk. In many cases, the picture that these companies are able to build up using these methods enables them to lend to those who banks will not.

Continue reading →

Could Proper Data Security Require Traps, Not Walls?

Posted on May 13, 2015 by Georgina Park |Leave a comment|

Is cyber security changing?

Recent comments by a variety of security experts suggest that some of the world’s biggest businesses are changing the way that they keep their data safe.

Since the birth of the internet more than twenty years ago, data security has centred around keeping the ‘bad guys’ out. IT departments have kept their organisations safe by building walls and digging moats around sensitive information.

Continue reading →

What the Enterprise Cloud Needs to Send Business Critical Files

Posted on May 12, 2015 by Georgina Park |Leave a comment|

Since its birth, the cloud has become increasingly synonymous with the convenient, simple sharing of non-sensitive data.

Read more: How the Cloud Means That Every Situation Has a Scalable Solution

IT departments would roll it out to enable employees to send and receive files across different locations – improving productivity, offering flexibility and making the day-to-day generally easier. The cloud would be used to send and receive temporary files between departments and share non-sensitive files, particularly during seasonal spikes in demand.

Continue reading →

Which Secure File Transfer Product Is Right For Me?

Posted on April 29, 2015 by Georgina Park |Leave a comment|

Image Source

 

There are so many file sharing products on the market it can be really hard to find the right one. That’s why we’ve put together this handy guide for you listing all the considerations:

#1 Access Protocols

Consider what protocols you need and how you want your users to connect. Some businesses will choose to connect over SFTP and others will conduct all file sharing over HTTPS. SFTP is better for automated workflows and larger files.

Continue reading →

Who needs to be PCI Compliant?

Posted on April 29, 2015 by Georgina Park |Leave a comment|

Source: https://www.pcicomplianceguide.org/

Businesses that need to be PCI Compliant can typically be split into two areas: Merchants and Service Providers.

Continue reading →

Maytech FAQs: Government Secure Data Transfer

Posted on April 28, 2015 by Georgina Park |Leave a comment|

Image Source

Where Government secure data transfer is right now

At Maytech we provide secure data transfer to a whole host of industries and specialise in the UK Government and Public Sector. We’ve been speaking to our government customers about how file changing is changing in the sector and what this means for IT departments.

Continue reading →

Search

Subscribe

How FTP-Stream Works

Click here to find more
cta_maytech_sidebanner_blue