It’s that time of month again were we look at all the things that have been happening in China’s world of technology. Here is everything you need to know:Continue reading →
Are you trying to send files to China?
Have you tried all the usual suspects like Dropbox, Box, Hightail, WeTransfer and had no luck?
Well… you’ve come to the right place. FTP-Stream China from Maytech connects you with China over a fast, uncongested fibre network. Our Hong Kong data centre has direct regional links with mainland China to provide fast web, FTP and SFTP transfers.Continue reading →
Maytech, the creators of FTP-Stream have just launched Two-Factor Authentication or as it’s more commonly known 2FA.
Two-Factor authentication goes beyond the traditional email and password requirement and asks for a unique piece of information that only the user would have on them. This can be in the form of a security token or SMS code. It makes it much harder for account access to be compromised, making for much safer and more secure data transfer processes.Continue reading →
When buying a secure cloud file transfer platform there are hundreds of considerations which will impact the security of your data. This article highlights the top 12 considerations for your business. Most apply across all industries but there are a couple that are more relevant to certain sectors.Continue reading →
Back in the day, if somebody wanted to steal your car they’d force the door, jimmy the lock or break the window.
Now, that’s a thing of the past. All a criminal needs to force entry into your car these days is an iPad!
How is this? As technology has advanced, more and more of these electrical, computer goodies have been packed into your car, with computers controlling everything from unlocking the doors to starting the engine and even maintaining speed.Continue reading →
The G-Cloud framework allows public sector bodies to access IT and computing solutions on the cloud, without having to invest in expensive, inflexible physical hardware.
To ensure that IT departments in the public sector can share data completely safely, G-Cloud services come in three different levels. These levels are:
Secure data transfer
In today’s world, secure data transfer is becoming more and more important. Two Factor Authentication (or as the IT-Pros know it…2FA) is becoming a much more common security requirement.
Most online security procedures require a simple username and password. Lots of users use weak passwords at home. For example the dogs name followed by 2000 e.g. Rufus2000. There is a UK Government campaign advertising preventing this and encourage people to use hard to hack passwords.Continue reading →
Secure file transfer is an essential requirement for most industries. But how can you optimise your secure file transfer to get the most out of it? Read our 10 tips below:Continue reading →
Looking to reduce your PCI scope? Tokenisation is an encryption method that’s used by IT teams across the world to safely handle customer data and safeguard PCI compliance.Continue reading →
If you’re running a business, dealing with China can be a very attractive prospect. After all, the Eastern giant is the world’s largest purchasing economy and has proved largely recession-proof, with growth rates averaging 10% year-on-year since 1980.
Nevertheless, there’s one major concern for businesses: the Great Firewall of China. The uncertainty around the ‘Golden Shield’ project can dissuade many companies from expanding into the world’s second economic superpower.