Try it for yourself
Start my FREE trial now

How to Use e-Signatures to Decrease the Risks of Document File Sharing

Posted on March 03, 2017 by John Lynch |Leave a comment|

Cirius has reported that 97% of organisations still think that file sharing can risk information loss and 75% believe they are currently in jeopardy. So, how can companies improve their processes to minimise threats?

Continue reading →

Which of Your Favourite Websites Are Blocked in China?

Posted on March 03, 2017 by John Lynch |Leave a comment|

It’s no secret that many websites that the average Westerner visits on a daily basis are blocked in China. With its strict online censorship, the nation believes it is protecting national security, as well as preventing ‘dangerous’ Western ideologies, fashions and anti-state sentiments from being viewed or discussed on the internet.

Read more:Is the Great Firewall of China Threatening Business?

Here we’ve created a brief outline of the types of sites you may struggle to access when visiting the nation:

Continue reading →

Is China's Censorship Extending to Apps?

Posted on March 02, 2017 by John Lynch |Leave a comment|

In January 2017, China ordered Apple to remove the New York Times app from its app store as part of a major crackdown on apps used within the country.

China then announced that all app stores operating within its borders must register with the Cyberspace Administration. It is hoped this will help in the fight against cybercrime, as well as provide tighter controls over currently uncensored content.

Continue reading →

What Is Automated Polymorphic Malware and Why You Don't Want it?

Posted on March 01, 2017 by John Lynch |Leave a comment|

From viruses to worms, trojans to spyware, we all know that malware is dangerous to a business network, but there are many complexities when it comes to protecting your business from them. Here we take a closer look at automatic polymorphic malware.

Continue reading →

How the UK is Closing the Cybersecurity Skills Gap

Posted on March 01, 2017 by John Lynch |Leave a comment|

The UK cyber security workforce has grown 163% in five years, however there is still a global skills shortage for trained experts.

Continue reading →

The Most Common Scam Emails of the Moment: What to Look Out for

Posted on March 01, 2017 by John Lynch |Leave a comment|

Cybercrime has grown tenfold over the last couple of years and is constantly developing so attackers can stay ahead of the trend and evade detection.

However, every few months there is a cybercrime trend that emerges – in early 2017 this is phishing scams.


Here we explain some of the most common criminal email schemes we’re hearing about and what can be done about them.

Continue reading →

Maytech’s China Monthly Update – February 2017

Posted on March 01, 2017 by John Lynch |Leave a comment|

If you frequently send secure file transfers to China, then you may like to read the latest cybersecurity news stories from the People's Republic.

Continue reading →

Maytech’s China Monthly Update – January 2017

Posted on February 09, 2017 by John Lynch |Leave a comment|

Happy New Year from the team here at Maytech! Let’s start 2017 off right by brushing up on the latest news from tech giant China.

Continue reading →

Survey: Cloud Data More Essential Than Offline Centres

Posted on January 23, 2017 by John Lynch |Leave a comment|

36% of IT professionals think that data loss in the cloud would be more catastrophic than if it was compromised from a data centre crashing, a survey has found. The statistics, taken from a survey of 500 IT experts by CTERA, also found that 14% would fear for their job if data was lost from the cloud.

Continue reading →

Cyberattacks Will Be More Menacing in 2017

Posted on January 23, 2017 by John Lynch |Leave a comment|

As the New Year comes around every twelve months, so do predictions for the year ahead and the growing importance of cybersecurity is more relevant than ever (we wrote our own predictions for 2017 trends here ). Every year, the demand for cybersecurity increases, with the volume and complexity of online attacks expanding. Unfortunately, 2017 is no different.

Continue reading →

Search

Subscribe

How FTP-Stream Works

Click here to find more
cta_maytech_sidebanner_blue