Maytech Customer Voice 2017

A New Data Security Solution

Tokenisation Addresses Cyber Security Risk and Compliance. Here’s Why

Chinese Officials Say the Great Firewall is Too Strict

Why You Should Always Lie When Answering Password Security Questions

The 10 Most Notorious Data Breaches That Have Hit the UK

The Latest in Encryption: What's New?

Why Regularly Changing Your Password Puts You More at Risk of Attack

Fear Sees UK Cyber Insurance Demand Skyrocket

The UK and China Agree on Cyber-Security Coordination

Which of Your Favourite Websites Are Blocked in China?

Cyberattacks Will Be More Menacing in 2017

Should You Be More Worried About Internal Threats?

Local Government IT Security is Experiencing ‘Issues’

Why the Healthcare Sector Needs Secure Messaging

The Problem With Email Communication in China

Is Your Email Secure? Messaging Safety in Facts and Figures

7 Security Problems When Sending Emails

Protect Your Data: 5 Ways to Improve Your Security Posture

Five Emerging Threats Enterprise Security Must Not Ignore

The Biggest Fears of the International IT Manager

Solving Your China File Transfer Problems

GCloud 8: What is it and How Can it Secure File Transfer for Governments?

How to Avoid the Risk of Transferring Data to/from China in the Future

Why Maytech’s FTP-Stream China is the Answer to Great Firewall of China Woes

Government File Transfers and the Latest Consultations

4 Reasons Why Maytech Use Local Data Centres Across the World

People: An Organisation’s Biggest Security Weakness (and Strength)

Apple vs. The US Government: Unlocking the Answer to a Crime

Case Study: How Maytech Helps Local Government

ISPs Forced to Store Details of all UK Website Visits

8 Tips to Keep Your Business’ Data Secure

2015 PCI Roundup: What You Need to Know

A Practical Approach to Secure File Sharing Outside PSN

What to Consider When Migrating Your Business to the Cloud

The Average Cost of a Data Breach? $3.8m

Digital Marketplace Turns One

Just How Harmful is Shadow IT to Your Company?

Sharing Challenges: Should Employees Use Consumer File Sharing?

What Do Changes in EU Data Protection Regulation Mean For You?

The Hidden Costs of Cyber Crime

Data Encryption Within the Cloud: What You Need-to-Know

8 of the Most Common PCI Myths

Cost of Data Breaches to the UK

VPNs in China – What’s the Problem? Your Essential Guide

PCI Audit Failures: 6 Reasons Why it Happens to Businesses

Hackers Becoming More Innovative to Steal Data

How the Great Firewall of China Affects Chinese Innovation

Considerations When Choosing A Secure Data Transfer Platform

Ramp up your BYOD Security

How Do I Send Large Files?

What is the Great Cannon of China? How Does it Affect You?

How To Avoid Email Security Breaches

What Are the Three File Sharing Options for UK Government?

Maytech Launches Its US West Coast Data Centre

Data Residency: What Are the Differences Between EU Or US?

The Most Deadly Fears of the 21st Century IT Manager

15 Top Tips for Choosing a File Sharing Service

External File Sharing for the UK Government

How Maytech Makes Data Sharing More Secure

What to do if Your Business Has Suffered a Data Breach

Why It Pays to Invest in Gold-Standard China File Transfer

EU and US on Collision Course Over Data Privacy

PAN Government Accredited File Sharing

Staying on the Right Side of Data Residency in a Globalised World

Could Proper Data Security Require Traps, Not Walls?

What the Enterprise Cloud Needs to Send Business Critical Files

Which Secure File Transfer Product Is Right For Me?

Who needs to be PCI Compliant?

Why it’s Critical to Invest in File Sharing with China from the Start

The China File Sharing Headache

Top 12 Security Considerations For File Sharing

How Do I Know if G-Cloud Services are Secure Enough For My Data?

Two Factor Authentication – What’s it all about?

How Does Tokenisation Reduce PCI Scope?

Small Business Guide: The Great Firewall of China’s Pros and Cons

5 Simple Ways You Can Reduce Your Organisation’s PCI Scope

Is Your Business Still PCI Compliant?

PCI DSS 3.0: Did Encryption Go Far Enough?

How Speed Makes Maytech a Trusted China File Sharing Partner

Drinking to the Future with a Beer and Big Data

Security Controls for OFFICIAL-SENSITIVE Information

Public, Private, Hybrid, Saas or Paas – What’s the Difference?

What Are The Cloud Sharing Options in China?

How Does Data Protection Differ Between China and The West?

Internship Programme Launched In Maytech’s UK Office

What Are the Three Biggest Threats to Government Data Security?

Why Do I Need to be PCI Compliant?

What are the UK Government’s Cloud Security Principles?

PCI: Essential Security or Just Ticking a Box?

The Future of PCI

Everything You Need To Know About Quatrix And FTP-Stream

Secure File Transfer for UK Government Departments

How Important Is PCI To Your Organisation?

Functionality to Streamline Services

How to Ensure Your Business is PCI-DSS Compliant

Why You Need To Encrypt Your Data

Dealing With Missing Data – Who Carries The Can?

5 Problems With Sharing Data in China

A Beginners guide to Quatrix

Ensuring PCI Compliance In The Cloud

The Balancing Act of Usability and Security for IT Departments

Big Data and the 2014-15 Volvo Ocean Race

The Best Customers In The World (You Know One Of Them Very Well)

Is the Great Firewall of China Threatening Business?

The World’s Largest Data Centres

If You Don’t, Your Employees Will (Hint: You Don’t Want Them To)

Quatrix: The Easiest Way To Send Files Securely Online

2 Ways To Send Large Files Securely Across The Internet

Why China Said “No” To Dropbox

Why Major Players in the Media Choose Maytech

How Safe is Your Data with Contactless Payments?

Award-Winning CEO Shares Secrets To Running A Successful Company

What PCI DSS and its 288 Controls Mean to You

Chinese Government Reveals Microsoft Patents

Accidentally Saving The NHS...With Data Audits

UK Financial and Retail Firms Branded “Naive” Over Data Security

A Beginner’s Guide to PCI Compliant Data Acquisition

The Essential 2-Step Cheat Sheet For HIPAA Compliance

5 Biotech Startups Using Big Data To Shake up Big Pharma

What is IL3 Accreditation and Why Are We Getting It?

Growing Companies Equals Growing Data Risks

How Use the Maytech Widget To Boost Customer Engagement Online

How Data Transfer is Taking On Global Warming

The Problem of PCI Compliance

eBay Hacking And The Tightrope Walker’s Dilemma

Why Digital Is Killing Off The Iconic 35mm Film

A Basic Guide to Cloud Security for Pharmaceutical Companies

File Sharing Standards in the Financial Industry

A Basic Guide To Data Centre Resiliency

Maytech’s Modern Speeds and the Race to Transfer Your Files

Why Global Construction Needs Global File Sharing

Quatrix: the Fort Knox of File Sharing

Why is a Secure File Sharing Platform Vital to My Business?

Our Data Travels Quicker Than…

Introducing Quatrix

Your Data, Your File Sharing Vendor, Your Responsibility

PCI Industry Compliant File Transfer

8 Steps To Protecting Yourself From The OpenSSL Heartbleed Bug

Encryption: What It Is and How You Can Use It

5 Data Sharing Secrets of the Fortune 500

Bring Your Own File Transfer Equals Risky Business

It’s time to get On Board

Taking Security Seriously

The Only 2 Ways To Send Large Files Over The Internet

What on Earth is G-Cloud?

Maytech CEO's secure file sharing tips for 2014

A big world requires freedom of big data

Creating and fulfilling an information security policy

Lifting China’s Great Wall

Maytech given G-Cloud green light

Maytech puts its foot down!

Maytech focused on accelerating growth after MXC Capital investment

5 PCI Compliance Myths

China and the Cloud

1001 Managed File Transfer Applications

FTPS and SFTP - Which secure file transfer protocol should I use?

Which file transfer service is best for my business?

Cloud managed file transfer checklist

Is encryption at rest just tickbox security?

Large file transfer to China - reliability is key

Subscribe

Recent Entries

cta_maytech_sidebanner_blue