Try it for yourself

PCI: Essential Security or Just Ticking a Box?

Posted on January 25, 2015 by Georgina Park |Leave a comment|

When representatives from some of the world's leading financial organisations joined together nearly ten years ago to form the PCI-DSS, it was a big step forward for online security. It was the first time that the world's biggest names had joined together to provide a 'one size fits all' approach to financial security.

From then on, any business that wanted to accept money from any major banks had to abide by the PCI DSS. Today, the PCI-DSS is near enough ubiquitous in the business climate.

Continue reading →

Is Your Business’s Cloud Set Up and Working Properly?

Posted on January 23, 2015 by Georgina Park |Leave a comment|

Many businesses benefit hugely from being able to access files and data from anywhere, using cloud technology. The cloud is an instrumental tool for large, international businesses, and small ones alike, as they can back-up, store and send files at a moment’s notice – from anywhere.

If your business is already using the cloud, then it makes sense to ensure that is has been correctly set up and is working properly. This includes having staff members fully trained in the ins and outs of the systems. Here’s how you can tell if your system has been set up properly and is working efficiently:

Continue reading →

How Will Legal Changes Affect Businesses in China?

Posted on January 21, 2015 by Georgina Park |Leave a comment|

In October, China’s leading politicians concluded The Fourth Plenum, a four-day conference that aimed to change the rule of law in the country.

After the Plenum Xi Jinping, the leader of the Chinese Communist Party issued a list of different measures that it hoped would lessen the corruption that occurs inside local and central government on a national scale.

Continue reading →

The Future of PCI

Posted on January 19, 2015 by Georgina Park |Leave a comment|

It hasn’t been a good year for data breaches, with big companies being targeted by cybercriminals and as many as 2.3 billion records being believed to be compromised. This figure highlights the worries that merchants have about point-of-sale breaches and begs the questions, what is the future of PCI?

Continue reading →

Month on Cloud China – December 2014

Posted on January 16, 2015 by Georgina Park |Leave a comment|

This month’s cloud file transfer news on Cloud China.

China blocks thousands of websites and cloud services ahead of tech conference

Tech giants invest $300m in Chinese cloud data supplier

Continue reading →

Saudi Arabia, ICT and the Cloud

Posted on January 14, 2015 by Georgina Park |Leave a comment|

Saudi Arabia and, in fact, the whole UAE are rapidly developing nations thanks to the oil shock of 1973 which launched the nation ahead in terms of global importance. In the G20 Summit in November 2014, Saudi Arabia announced a plan that is designed to deepen and accelerate the pace of economic diversification within the state.

One of the ways that it has been suggested that this can be done is by expanding the IT and Big Data available in Saudi Arabia.

Continue reading →

The Security Challenges Facing 21st Century Business

Posted on January 12, 2015 by Georgina Park |Leave a comment|

Businesses have always been concerned about properly guarding their data. Before the computer age they would keep certain physical files under tight control, only allowing certain people to gain access to lucrative, confidential information.

Yet, the technology surrounding file protection has changed. Information is now near-universally shared online – which means that IT professionals’ security strategies have to change accordingly.

Many businesses tend to experience damaging leaks all the time. Some simply try to anticipate these leaks and account for them, but without the proper tools others are simply swimming against the tide.

Continue reading →

How Google Uses Big Data to Understand You

Posted on January 05, 2015 by Georgina Park |Leave a comment|

Every day, increasing amounts of data are gathered by Google about the way that we use its services. The data that it collects is used to hone its understanding of us and how we behave online.

That might sound a little creepy, but it’s this data-driven outlook that has been key to the online giant’s continued success.

Continue reading →

The History (and the Future) of The Silk Road in China

Posted on January 02, 2015 by Georgina Park |Leave a comment|

With a GDP that exceeds 17tr, China’s status as a global superpower is by now undeniable. But much of this economic strength can be traced back thousands of years to just one ancient trade route: The Silk Road.

Continue reading →

Everything You Need To Know About Quatrix And FTP-Stream

Posted on December 29, 2014 by Georgina Park |Leave a comment|

At Maytech we specialise in secure cloud file transfer. And to make sure we can help you optimise your workflows, we have two different products. So… how do you choose which one is right for you?

Firstly, it’s important to note that Maytech is ISO-27001 certified, approved as Enterprise Ready by SkyHigh Cloud Trust ™, and a GCloud supplier (a UK government provider). All our products are HIPAA compliant and come with 24/7 support.

Continue reading →

Search

Subscribe

How FTP-Stream Works

Click here to find more
cta_maytech_sidebanner_blue