Page 5 of 8

eBay Hacking And The Tightrope Walker’s Dilemma

“If you had a friend who was a tightrope walker and he tripped and fell on the sidewalk, that would be completely unacceptable.” – Mitch Hedberg Two months ago, eBay got hacked. Two weeks ago, eBay – the owners of… Continue Reading →

5 Biotech Startups Using Big Data To Shake up Big Pharma

Big data is dividing the world into two distinct categories: the big data haves and have-nots. Nowhere is this more evident than in the healthcare and pharmaceutical industries that traditionally are not associated with innovation and change. But whilst many… Continue Reading →

What is IL3 Accreditation and Why Are We Getting It?

Never one to rest on our laurels when it comes to secure data transfer, we are currently undertaking the IL3 security accreditation for our ICT system. This accreditation requires enhanced security to protect sensitive information and is a common requirement… Continue Reading →

Chinese Government Reveals Microsoft Patents

When Microsoft completed its acquisition of the Nokia Devices and Services business in April of this year neither party was legally allowed to discuss details about the deal in public leaving experts and commentators to speculate about how things would… Continue Reading →

Accidentally Saving The NHS…With Data Audits

The NHS is in trouble. £2 billion pounds’ worth, according to healthcare bosses. The demands of an ageing population, higher NHS pension costs, rocketing population growth and numerous other forces are conspiring to make the 66-year-old healthcare service buckle. Suggestions… Continue Reading →

How Safe is Your Data with Contactless Payments?

Radio-frequency identification (RFID) payment technology is here. It’s being used in smartphone retail payment solutions like Google Wallet, in prepaid payment cards like Transport for London’s Oyster card, and it’s being rolled out on debit cards for low-value goods up… Continue Reading →

If You Don’t, Your Employees Will (Hint: You Don’t Want Them To)

If you don’t take care of your customers, someone else will. This is a tried-and-tested mantra of business, proven over millennia of people doing business with each other. And the businesses that thrive are those who realise that not only… Continue Reading →

Quatrix: The Easiest Way To Send Files Securely Online

“Simplicity is the ultimate sophistication.” – Leonardo da Vinci The data transfer industry has been dramatically transformed in the last few years. Businesses used to use old, clunky FTP sites when Dropbox transformed the market with its simple file sharing… Continue Reading →

The World’s Largest Data Centres

On the 3rd of September 2014, the world came to an end…for all of 20 minutes. Why? Facebook was shut down due to an issue with an infrastructure configuration in its data centres, and its 1.23 billion users were cut… Continue Reading →

A Beginners Guide to Quatrix

The easiest way to send files securely online. That’s the tagline and vision behind our product called Quatrix®. It articulates a marriage between fast file transfer, convenience and flexibility of use, and premium-grade security features. And it embodies our deep… Continue Reading →

What are the UK Government’s Cloud Security Principles?

In 2015, 50% of all new Government IT spending will be on the cloud. And when it comes to cloud security, there’s a lot that businesses and IT departments could learn from the Government. After all, it will deal with… Continue Reading →

PCI: Essential Security or Just Ticking a Box?

When representatives from some of the world’s leading financial organisations joined together nearly ten years ago to form the PCI-DSS, it was a big step forward for online security. It was the first time that the world’s biggest names had… Continue Reading →

How Does Data Protection Differ Between China and The West?

A history of data protection in China Data protection in China has notoriously lagged well behind its economic rivals in the West. Before 2008, the state announced a range of administrative restrictions around data protection – but in truth, these… Continue Reading →

PCI DSS 3.0: Did Encryption Go Far Enough?

In January 2015, PCI DSS 3.0 was brought into effect in order to help bring about vital changes but many sources argue that it didn’t take encryption far enough. Is this true? Maytech takes a look at what changes 3.0… Continue Reading →

How Speed Makes Maytech a Trusted China File Sharing Partner

If your organisation works in and with China, you’ll know that organisations can face a number of different problems – many of which we discussed in this blog. (Free to use – no attribution required) But there’s no doubt that… Continue Reading →

« Older posts Newer posts »