Try it for yourself
Start my FREE trial now

Georgina Park

I am a marketing enthusiast in my twenties who loves travelling, sports and socialising. I recently returned from a round the world backpacking trip and currently keep dreaming of sandy beaches!
Find me on:

Recent Posts

Maytech’s Monthly China Roundup - April 2015

Posted on April 25, 2015 by Georgina Park |Leave a comment|

It’s that time of month again were we look at all the things that have been happening in China’s world of technology. Here is everything you need to know:

Continue reading →

The China File Sharing Headache

Posted on April 24, 2015 by Georgina Park |Leave a comment|

Are you trying to send files to China?

Have you tried all the usual suspects like Dropbox, Box, Hightail, WeTransfer and had no luck?

Well… you’ve come to the right place. FTP-Stream China from Maytech connects you with China over a fast, uncongested fibre network. Our Hong Kong data centre has direct regional links with mainland China to provide fast web, FTP and SFTP transfers.

Continue reading →

Maytech Launch 2FA In FTP-Stream

Posted on April 23, 2015 by Georgina Park |Leave a comment|

Maytech, the creators of FTP-Stream have just launched Two-Factor Authentication or as it’s more commonly known 2FA.

Two-Factor authentication goes beyond the traditional email and password requirement and asks for a unique piece of information that only the user would have on them. This can be in the form of a security token or SMS code. It makes it much harder for account access to be compromised, making for much safer and more secure data transfer processes.

Continue reading →

Top 12 Security Considerations For File Sharing

Posted on April 22, 2015 by Georgina Park |Leave a comment|

When buying a secure cloud file transfer platform there are hundreds of considerations which will impact the security of your data. This article highlights the top 12 considerations for your business. Most apply across all industries but there are a couple that are more relevant to certain sectors.

Continue reading →

Keys Shmeys: Can Your Car be Hacked?

Posted on April 20, 2015 by Georgina Park |Leave a comment|

Back in the day, if somebody wanted to steal your car they’d force the door, jimmy the lock or break the window.

Now, that’s a thing of the past. All a criminal needs to force entry into your car these days is an iPad!

How is this? As technology has advanced, more and more of these electrical, computer goodies have been packed into your car, with computers controlling everything from unlocking the doors to starting the engine and even maintaining speed.

Continue reading →

How Do I Know if G-Cloud Services are Secure Enough For My Data?

Posted on April 16, 2015 by Georgina Park |Leave a comment|

The G-Cloud framework allows public sector bodies to access IT and computing solutions on the cloud, without having to invest in expensive, inflexible physical hardware.

To ensure that IT departments in the public sector can share data completely safely, G-Cloud services come in three different levels. These levels are:

Continue reading →

Two Factor Authentication – What’s it all about?

Posted on April 15, 2015 by Georgina Park |Leave a comment|

Secure data transfer

In today’s world, secure data transfer is becoming more and more important. Two Factor Authentication (or as the IT-Pros know it…2FA) is becoming a much more common security requirement.

Most online security procedures require a simple username and password. Lots of users use weak passwords at home. For example the dogs name followed by 2000 e.g. Rufus2000. There is a UK Government campaign advertising preventing this and encourage people to use hard to hack passwords.

Continue reading →

10 Top Tips for Secure File Transfer

Posted on April 13, 2015 by Georgina Park |Leave a comment|

Secure file transfer is an essential requirement for most industries. But how can you optimise your secure file transfer to get the most out of it? Read our 10 tips below:

Continue reading →

How Does Tokenisation Reduce PCI Scope?

Posted on April 13, 2015 by Georgina Park |Leave a comment|

Looking to reduce your PCI scope? Tokenisation is an encryption method that’s used by IT teams across the world to safely handle customer data and safeguard PCI compliance.

Continue reading →

Small Business Guide: The Great Firewall of China’s Pros and Cons

Posted on April 12, 2015 by Georgina Park |Leave a comment|

If you’re running a business, dealing with China can be a very attractive prospect. After all, the Eastern giant is the world’s largest purchasing economy and has proved largely recession-proof, with growth rates averaging 10% year-on-year since 1980.

Nevertheless, there’s one major concern for businesses: the Great Firewall of China. The uncertainty around the ‘Golden Shield’ project can dissuade many companies from expanding into the world’s second economic superpower.

Continue reading →

Search

Subscribe

How FTP-Stream Works

Click here to find more
cta_maytech_sidebanner_blue