Maytech Blog

Secure and reliable data transfer

Page 2 of 7

Quatrix Express – a Desktop Application for Convenient and Secure File Transfer

Fast information exchange and stringent security measures don’t usually go hand in hand. But while companies implement strict security policies due to complicated compliance requirements, regular users are prone to overlook security measures and go ahead with insecure, but convenient… Continue Reading →

Growing Companies Equals Growing Data Risks

“Growth demands a temporary surrender of security.” Gail Sheehy, New York Times Bestselling Author  Despite talking about the stages people pass through in life in her best-selling book Passages, Gail Sheehy’s quote could not be apter in describing the battle… Continue Reading →

Taking Security Seriously

Imagine one day leaving for work and, as you close the front door behind you, discovering that someone has graffitied in red spray paint all over the face of your home – door, windows, paintwork, roof, the lot. You’d be… Continue Reading →

5 PCI Compliance Myths

If your business takes credit cards, it’s vital that it’s compliant with the Payment Card Industry Data Security Standard (PCI DSS), which is designed to protect and secure stored, processed and transmitted Primary Account Numbers (PANS) and credit card holder… Continue Reading →

Your Data, Your File Sharing Vendor, Your Responsibility

It’s no coincidence that the first point of call for any parents in the market for a babysitter is family. Outside of the cheap labour costs, family also represents people they know and trust. When it comes to business file… Continue Reading →

Introducing Quatrix

At Maytech we never stop innovating, so it’s with great pleasure we’re announcing the latest evolution of our growing product range: Quatrix®. Quatix is for organisations that crave a no-nonsense data-transfer service which is fast and secure, because it marries these… Continue Reading →

Our Data Travels Quicker Than…

There’s a saying about time that it is an equal opportunity employer. Everybody gets 24 hours/1,440 minutes/86,400 seconds a day no matter who you are, where you’re from or how much wealth you have. Some just do things quicker than… Continue Reading →

eBay Hacking And The Tightrope Walker’s Dilemma

“If you had a friend who was a tightrope walker and he tripped and fell on the sidewalk, that would be completely unacceptable.” – Mitch Hedberg Two months ago, eBay got hacked. Two weeks ago, eBay – the owners of… Continue Reading →

How Data Transfer is Taking On Global Warming

It is well documented that the Arctic polar ice caps are melting. What is not well documented is its advantages and the role secure and reliant data transfer plays in exploiting them. Luckily the ice in the North Pole is… Continue Reading →

What is IL3 Accreditation and Why Are We Getting It?

Never one to rest on our laurels when it comes to secure data transfer, we are currently undertaking the IL3 security accreditation for our ICT system. This accreditation requires enhanced security to protect sensitive information and is a common requirement… Continue Reading →

« Older posts Newer posts »