dcsimg

Using Managed File Transfer (MFT) To Harden Data Security

How is it that so many organizations focus on perimeter defense but do little to protect the target data inside that perimeter? Wouldn’t it be wonderful to protect sensitive data even if the network is breached? … [Read more...]

Another day, another attempt to scam me – but I know a phishing attempt when I see one!

It’s just a fact of life: If there’s email, there will always be spam. Now, how much spam you have to deal with will depend on how good your spam filtering solution is. Here at MDaemon Technologies, we use our own products – MDaemon and Security Gateway, to filter out spam, malware, phishing attempts, and all of the other junk that often floods inboxes of users whose email server … [Read more...]

Four Types of Log Data to Manage and Monitor

There are so many types of log data to monitor and manage, but what are the most important logs to track? These are the top four types of log data that every IT team should be holding on to just in case. … [Read more...]

8 Reasons To Automate Your File Transfers

We all know it and are no doubt tired of hearing it, but in today’s global technological landscape, there is an ongoing and increasing danger of being hacked. … [Read more...]

How to Copy Files to Azure Blob Storage

When working with Microsoft Azure, you'll inevitably come to a point to where you need to access material stored locally on premise. … [Read more...]

Podcast: Artificial Intelligence Vs. Automation for SecOps Teams

Automation is not always AI, but AI is an automated system. It’s easy to get the two terms confused because they both run off the same thing—data. However, the differences are far-reaching, and it’s important to know the differences between AI and Automation. … [Read more...]

Defend Your Digital Assets Against Cyberattacks: 5 Log Management Best Practices

Every device, OS and application in your IT environment generates a record of activities in the form of log files. These audit trails of activity provide valuable information when investigating security breaches and when submitting regulation compliance reports. … [Read more...]

Podcast – 12 Years Later: How the TJX Hack Changed Security and Compliance

In this episode of Defrag This, we’re taking a look back at one of the most monumental events in hacker history—the 2007 hack of TJX companies, which was, at the time, the biggest breach of consumer data in the history of the United States. … [Read more...]

Installing Duo 2FA for Windows Log-on and RDP

Two-factor authentication is currently one of the best security practices for protecting users, data and systems. Duo is one of the leading platforms for using two-factor authentication in the enterprise as it protects many common on-premises and cloud applications by default. … [Read more...]

Podcast: State of Data Security in 2019

It’s hard to say if things are looking up or down for data security. It seems that companies across all industries are making a point to secure all their data in the wake of the massive data breaches of the past few years. … [Read more...]