Int & UK:
+44 (0) 189 286 1222
US & CA:
1 800 592 1906
Professional File Sharing
File sharing to China
PCI Compliant Data Hosting
Large File Transfer
Secure Data Acquisition
Secure File Sharing
HIPAA Compliant File Transfer
G-Cloud Digital Frameworks
Secure Passwords and 2FA
ISO 27001 Certification
World Class Customer Support
Media & Broadcasting
Finance & Banking
Construction & Engineering
Plans and Pricing
Maytech Customer Voice 2017
A New Data Security Solution
Tokenisation Addresses Cyber Security Risk and Compliance. Here’s Why
Chinese Officials Say the Great Firewall is Too Strict
Why You Should Always Lie When Answering Password Security Questions
The 10 Most Notorious Data Breaches That Have Hit the UK
The Latest in Encryption: What's New?
Why Regularly Changing Your Password Puts You More at Risk of Attack
Fear Sees UK Cyber Insurance Demand Skyrocket
The UK and China Agree on Cyber-Security Coordination
Which of Your Favourite Websites Are Blocked in China?
Cyberattacks Will Be More Menacing in 2017
Should You Be More Worried About Internal Threats?
Local Government IT Security is Experiencing ‘Issues’
Why the Healthcare Sector Needs Secure Messaging
The Problem With Email Communication in China
Is Your Email Secure? Messaging Safety in Facts and Figures
7 Security Problems When Sending Emails
Protect Your Data: 5 Ways to Improve Your Security Posture
Five Emerging Threats Enterprise Security Must Not Ignore
The Biggest Fears of the International IT Manager
Solving Your China File Transfer Problems
GCloud 8: What is it and How Can it Secure File Transfer for Governments?
How to Avoid the Risk of Transferring Data to/from China in the Future
Why Maytech’s FTP-Stream China is the Answer to Great Firewall of China Woes
Government File Transfers and the Latest Consultations
4 Reasons Why Maytech Use Local Data Centres Across the World
People: An Organisation’s Biggest Security Weakness (and Strength)
Apple vs. The US Government: Unlocking the Answer to a Crime
Case Study: How Maytech Helps Local Government
ISPs Forced to Store Details of all UK Website Visits
8 Tips to Keep Your Business’ Data Secure
2015 PCI Roundup: What You Need to Know
A Practical Approach to Secure File Sharing Outside PSN
What to Consider When Migrating Your Business to the Cloud
The Average Cost of a Data Breach? $3.8m
Digital Marketplace Turns One
Just How Harmful is Shadow IT to Your Company?
Sharing Challenges: Should Employees Use Consumer File Sharing?
What Do Changes in EU Data Protection Regulation Mean For You?
The Hidden Costs of Cyber Crime
Data Encryption Within the Cloud: What You Need-to-Know
8 of the Most Common PCI Myths
Cost of Data Breaches to the UK
VPNs in China – What’s the Problem? Your Essential Guide
PCI Audit Failures: 6 Reasons Why it Happens to Businesses
Hackers Becoming More Innovative to Steal Data
How the Great Firewall of China Affects Chinese Innovation
Considerations When Choosing A Secure Data Transfer Platform
Ramp up your BYOD Security
How Do I Send Large Files?
What is the Great Cannon of China? How Does it Affect You?
How To Avoid Email Security Breaches
What Are the Three File Sharing Options for UK Government?
Maytech Launches Its US West Coast Data Centre
Data Residency: What Are the Differences Between EU Or US?
The Most Deadly Fears of the 21st Century IT Manager
15 Top Tips for Choosing a File Sharing Service
External File Sharing for the UK Government
How Maytech Makes Data Sharing More Secure
What to do if Your Business Has Suffered a Data Breach
Why It Pays to Invest in Gold-Standard China File Transfer
EU and US on Collision Course Over Data Privacy
PAN Government Accredited File Sharing
Staying on the Right Side of Data Residency in a Globalised World
Could Proper Data Security Require Traps, Not Walls?
What the Enterprise Cloud Needs to Send Business Critical Files
Which Secure File Transfer Product Is Right For Me?
Who needs to be PCI Compliant?
Why it’s Critical to Invest in File Sharing with China from the Start
The China File Sharing Headache
Top 12 Security Considerations For File Sharing
How Do I Know if G-Cloud Services are Secure Enough For My Data?
Two Factor Authentication – What’s it all about?
How Does Tokenisation Reduce PCI Scope?
Small Business Guide: The Great Firewall of China’s Pros and Cons
5 Simple Ways You Can Reduce Your Organisation’s PCI Scope
Is Your Business Still PCI Compliant?
PCI DSS 3.0: Did Encryption Go Far Enough?
How Speed Makes Maytech a Trusted China File Sharing Partner
Drinking to the Future with a Beer and Big Data
Security Controls for OFFICIAL-SENSITIVE Information
Public, Private, Hybrid, Saas or Paas – What’s the Difference?
What Are The Cloud Sharing Options in China?
How Does Data Protection Differ Between China and The West?
Internship Programme Launched In Maytech’s UK Office
What Are the Three Biggest Threats to Government Data Security?
Why Do I Need to be PCI Compliant?
What are the UK Government’s Cloud Security Principles?
PCI: Essential Security or Just Ticking a Box?
The Future of PCI
Everything You Need To Know About Quatrix And FTP-Stream
Secure File Transfer for UK Government Departments
How Important Is PCI To Your Organisation?
Functionality to Streamline Services
How to Ensure Your Business is PCI-DSS Compliant
Why You Need To Encrypt Your Data
Dealing With Missing Data – Who Carries The Can?
5 Problems With Sharing Data in China
A Beginners guide to Quatrix
Ensuring PCI Compliance In The Cloud
The Balancing Act of Usability and Security for IT Departments
Big Data and the 2014-15 Volvo Ocean Race
The Best Customers In The World (You Know One Of Them Very Well)
Is the Great Firewall of China Threatening Business?
The World’s Largest Data Centres
If You Don’t, Your Employees Will (Hint: You Don’t Want Them To)
Quatrix: The Easiest Way To Send Files Securely Online
2 Ways To Send Large Files Securely Across The Internet
Why China Said “No” To Dropbox
Why Major Players in the Media Choose Maytech
How Safe is Your Data with Contactless Payments?
Award-Winning CEO Shares Secrets To Running A Successful Company
What PCI DSS and its 288 Controls Mean to You
Chinese Government Reveals Microsoft Patents
Accidentally Saving The NHS...With Data Audits
UK Financial and Retail Firms Branded “Naive” Over Data Security
A Beginner’s Guide to PCI Compliant Data Acquisition
The Essential 2-Step Cheat Sheet For HIPAA Compliance
5 Biotech Startups Using Big Data To Shake up Big Pharma
What is IL3 Accreditation and Why Are We Getting It?
Growing Companies Equals Growing Data Risks
How Use the Maytech Widget To Boost Customer Engagement Online
How Data Transfer is Taking On Global Warming
The Problem of PCI Compliance
eBay Hacking And The Tightrope Walker’s Dilemma
Why Digital Is Killing Off The Iconic 35mm Film
A Basic Guide to Cloud Security for Pharmaceutical Companies
File Sharing Standards in the Financial Industry
A Basic Guide To Data Centre Resiliency
Maytech’s Modern Speeds and the Race to Transfer Your Files
Why Global Construction Needs Global File Sharing
Quatrix: the Fort Knox of File Sharing
Why is a Secure File Sharing Platform Vital to My Business?
Our Data Travels Quicker Than…
Your Data, Your File Sharing Vendor, Your Responsibility
PCI Industry Compliant File Transfer
8 Steps To Protecting Yourself From The OpenSSL Heartbleed Bug
Encryption: What It Is and How You Can Use It
5 Data Sharing Secrets of the Fortune 500
Bring Your Own File Transfer Equals Risky Business
It’s time to get On Board
Taking Security Seriously
The Only 2 Ways To Send Large Files Over The Internet
What on Earth is G-Cloud?
Maytech CEO's secure file sharing tips for 2014
A big world requires freedom of big data
Creating and fulfilling an information security policy
Lifting China’s Great Wall
Maytech given G-Cloud green light
Maytech puts its foot down!
Maytech focused on accelerating growth after MXC Capital investment
5 PCI Compliance Myths
China and the Cloud
1001 Managed File Transfer Applications
FTPS and SFTP - Which secure file transfer protocol should I use?
Which file transfer service is best for my business?
Cloud managed file transfer checklist
Is encryption at rest just tickbox security?
Large file transfer to China - reliability is key
Cloud and Big Data
Global Data Transfer
How FTP-Stream Works
Click here to find more
Legal & Privacy
Book a Demo