Maytech Blog

Secure and reliable data transfer

Page 2 of 6

Growing Companies Equals Growing Data Risks

“Growth demands a temporary surrender of security.” Gail Sheehy, New York Times Bestselling Author  Despite talking about the stages people pass through in life in her best-selling book Passages, Gail Sheehy’s quote could not be apter in describing the battle… Continue Reading →

Taking Security Seriously

Imagine one day leaving for work and, as you close the front door behind you, discovering that someone has graffitied in red spray paint all over the face of your home – door, windows, paintwork, roof, the lot. You’d be… Continue Reading →

5 PCI Compliance Myths

If your business takes credit cards, it’s vital that it’s compliant with the Payment Card Industry Data Security Standard (PCI DSS), which is designed to protect and secure stored, processed and transmitted Primary Account Numbers (PANS) and credit card holder… Continue Reading →

Your Data, Your File Sharing Vendor, Your Responsibility

It’s no coincidence that the first point of call for any parents in the market for a babysitter is family. Outside of the cheap labour costs, family also represents people they know and trust. When it comes to business file… Continue Reading →

Introducing Quatrix

At Maytech we never stop innovating, so it’s with great pleasure we’re announcing the latest evolution of our growing product range: Quatrix®. Quatix is for organisations that crave a no-nonsense data-transfer service which is fast and secure, because it marries these… Continue Reading →

Our Data Travels Quicker Than…

There’s a saying about time that it is an equal opportunity employer. Everybody gets 24 hours/1,440 minutes/86,400 seconds a day no matter who you are, where you’re from or how much wealth you have. Some just do things quicker than… Continue Reading →

eBay Hacking And The Tightrope Walker’s Dilemma

“If you had a friend who was a tightrope walker and he tripped and fell on the sidewalk, that would be completely unacceptable.” – Mitch Hedberg Two months ago, eBay got hacked. Two weeks ago, eBay – the owners of… Continue Reading →

How Data Transfer is Taking On Global Warming

It is well documented that the Arctic polar ice caps are melting. What is not well documented is its advantages and the role secure and reliant data transfer plays in exploiting them. Luckily the ice in the North Pole is… Continue Reading →

What is IL3 Accreditation and Why Are We Getting It?

Never one to rest on our laurels when it comes to secure data transfer, we are currently undertaking the IL3 security accreditation for our ICT system. This accreditation requires enhanced security to protect sensitive information and is a common requirement… Continue Reading →

5 Biotech Startups Using Big Data To Shake up Big Pharma

Big data is dividing the world into two distinct categories: the big data haves and have-nots. Nowhere is this more evident than in the healthcare and pharmaceutical industries that traditionally are not associated with innovation and change. But whilst many… Continue Reading →

Accidentally Saving The NHS…With Data Audits

The NHS is in trouble. £2 billion pounds’ worth, according to healthcare bosses. The demands of an ageing population, higher NHS pension costs, rocketing population growth and numerous other forces are conspiring to make the 66-year-old healthcare service buckle. Suggestions… Continue Reading →

Chinese Government Reveals Microsoft Patents

When Microsoft completed its acquisition of the Nokia Devices and Services business in April of this year neither party was legally allowed to discuss details about the deal in public leaving experts and commentators to speculate about how things would… Continue Reading →

« Older posts Newer posts »