Category: Security
-

Easy Sarbanes-Oxley Act (SOX) compliance through secure protocols
Following major corporate scandals, most notably the high-profile cases of Enron, WorldCom and Tyco, the United States Congress responded by enacting the Sarbanes-Oxley Act of 2002 (SOX). The rationale for this federal law, which…
-

Protect cardholder data: PCI DSS compliance guide
In the highly regulated financial services industry, it’s crucial to maintain compliance with information security standards. Doing so establishes trustworthiness, mitigates data security risks and prevents costly fines and penalties stemming from non-compliance. One…
-

How to generate client certificates for SSL/TLS authentication
When we use Transport Layer Security (TLS), we typically do so to protect our data while transmitting it over the network and to ensure that our users are connecting to the right server. These…
-

9 best practices for secure document transfers in business operations
When you transfer documents as part of business operations, security is crucial. The growing volume of sensitive information involved in these activities puts businesses at greater risk of a data breach. If that information…
-

What is MFA authentication and why it’s crucial for file transfer security
Multi-factor authentication (MFA) is your file transfer systems’ first line of defense. With phishing attacks and compromised credentials being two of the most common threats any system faces, MFA has become the recommended standard…
-

What is SSO and how does it work? a guide for file transfer professionals
What is Single Sign-On (SSO)?
-

Fixing SSH/SFTP client connection issues involving Diffie-Hellman-Group1-SHA1
When you’re troubleshooting connectivity issues between Secure Shell (SSH)/Secure File Transfer Protocol (SFTP) clients and servers, it pays to inspect the error messages generated on both sides of a connection. Those messages often provide…
-

13 data security solutions: how data security can be implemented when transferring files
Why do some organizations excel in protecting their sensitive data during file transfers while others fall prey to cyber threats? What constitutes a fortified IT infrastructure capable of withstanding attacks?
-

PGP vs GPG: the key differences explained
Pretty Good Privacy (PGP) and GNU Privacy Guard (GPG) are two cryptographic software tools that enable data encryption, authentication, and integrity. These tools primarily secure email communications and transfer files. In the case of…
-

What is client certificate authentication?
Overview How do you strengthen a server’s user authentication system? Well, one solution would be to add another authentication method. Most servers authenticate users through the usual username-password technique. If you can augment that…
-
Perform directory virus scan using avast
This custom trigger action performs a virus scan against a directory using Avastanti-virus software. Downloads Source code and build instructions
-
Perform directory virus scan using kaspersky
This custom trigger action performs a virus scan against a directory using Kaspersky anti-virus software. Downloads Source code and build instructions
-
Update virus database definitions using kaspersky
This custom trigger action updates the virus database definitions using Kaspersky anti-virus software. Downloads Source code and build instructions
-
How to perform an antivirus scan with kaspersky
This custom trigger action performs a virus scan against a file using Kaspersky anti-virus software. Downloads Source code and build instructions
-
How to scan a file with avast antivirus
This custom trigger action performs a virus scan against a file using Avast anti-virus software. Downloads Source code and build instructions
-

Should we start using 4096 bit RSA keys?
Theoretically, RSA keys that are 2048 bits long should be good until 2030. If so, isn’t it a bit early to start using the 4096-bit keys that have become increasingly available in encryption-enabled applications?…
-

The SSH/SFTP key fingerprint and its role in server authentication
When users attempt to connect to your Secure File Transfer Protocol (SFTP) server for the first time, they’ll see an alert indicating that their client doesn’t recognize the host it’s connecting to. The warning…
-

Demystifying SMTP ports: when to use port 25, 587, 465 or 2525
When you’re tasked with configuring Simple Mail Transfer Protocol (SMTP) settings to connect to an email server, you need to get two main values right. Otherwise, your email delivery processes will fail. These values…
-

How to import a client certificate to firefox
Overview Client certificate authentication is very suitable for highly secure HTTPS connections. But for this type of authentication to work, the server must be configured for it, and a client certificate must be loaded…
-

How do digital certificates work – an overview
In our previous post, we discussed what a digital certificate is. But how do digital certificates work? Today, we will give you an overview of the basic process involving creating, signing, deploying, and using…
-

DSA vs. RSA encryption – which works best for file transfers?
Overview: DSA vs. RSA During the process of generating server keys, client keys, or PGP keys in the JSCAPE MFT Server Manager, you’re asked to choose between two supported key algorithms: RSA or DSA.…
-

How to prevent sniffer attacks with encrypted FTP
Overview A lot of people who often send files love FTP. The File Transfer Protocol allows users to transmit volumes of files over the Internet through uncomplicated FTP clients, some of which are already…
