Happy New Year from the team here at Maytech! Let’s start 2017 off right by brushing up on the latest news from tech giant China.Continue reading →
We frequently post on this blog about the Great Firewall of China and how it protects the Chinese people, but also hinders internet users and China file sharing at the same time - but recent reports claim that Russia is now considering its own state controlled internet system.Continue reading →
What was happening in the world of China file sharing, technology and security at the end of 2016? We summarise some of the main stories in one place. Read our roundup below.Continue reading →
It is well-known than young employees and new graduates can bring fresh insights to a business that has been trading for many years, but many young workers in China are forcing tech companies to change their attitudes.Continue reading →
In China, data security is always somewhat of a hot potato. It's an open secret that Chinese Government officials spy on internet traffic and analyse emails (although they officially deny this), while terms such as 'Ferrari', 'democracy' and 'Tianenmen Square', among hundreds of others, are blocked from search results in the country's version of Google, Baidu.
And when it comes to email, the People's Republic has a number of issues with that too. I take a look at China's problems with email: Continue reading →
The summer has now drawn to a close and we’re officially into autumn, but what were the biggest stories about China cyber security and data file sharing towards the end of the season? Take a look below:Continue reading →
Maytech provides secure and fast file transfer to and from China, and is one of few ISO 27001 certified companies that can provide a successful solution to the Great Firewall of China woes.
Millions of people in China have their internet use restricted by the Chinese government. And although it is in the ‘best interest’ of the people and security, for many it causes issues. Popular sites are blocked, services are restricted and internet use in general is slow and unreliable.
In order to explain the complexity of providing a working solution to these constraints, here we focus on the existing and recently drafted Chinese security laws that govern the internet and tech in the country:Continue reading →
The last month has been an eventful one for world news: Pokémon Go has quickly taken over social lives and the official countdown to the Rio Olympics 2016 has begun.
But what is the latest from the other side of the world?
For all the opportunities IT developments bring when it comes to storing or transferring sensitive data internationally, they naturally bring challenges, too. We’ve rounded up a few of the fears international IT managers are facing at the moment.Continue reading →