Good security practices in both small and large companies go a long way towards preventing breaches. Knowing where your network is vulnerable is part of the exercise in determining your current security risk. There are way too many tools that you can use to assess your weak points to ever
Read More
It's not uncommon to need access to files at different locations because you are traveling or working from home or at a client site. If the files you need contain sensitive information, like customer data, or a private key, you can use SENT to safely transport your file
Read More
If you need to send a one-off file to a recipient who doesn't have a SENT account yet, sending to their email address may be a good option. However, please note that this is a less secure option, so if you find yourself sending them files more than
Read MoreFrom Twitter to SnapChat, it’s clear that the internet is made for sharing. But sending sensitive information, intellectual property, and other sensitive data shouldn’t be done through social media, an email or email attachment. It requires a truly secure file transfer option. There are numerous products you can
Read MoreDespite the name, Enterprise Security still applies to small and medium sized businesses. Why would a small business invest in that kind of level of security? Simply because smaller businesses often depend on larger clients to keep them afloat, and those larger clients mandate security requirements to be met in
Read MoreThere is a misconception that I have come to see in my time working in IT that is more prevalent than any other: We are safe because we are small. Small businesses feel like they are shielded because they are small and not a known or big named target. This
Read MoreFirewalls have been around for about 20 years now. They emerged more prominently as the Internet became commercialized and more networks and people connected--which meant more targets. Having a firewall is pretty much a mainstay today. You will find dedicated firewall appliances or Internet routers with so-called firewall capabilities. These
Read More