Uncategorised SSH Key Management: Best Practices and Tools June 3, 2024 / September 2, 2025 by Lee Painter Secure Shell (SSH) is a powerful protocol for securing remote connections, and key-based authentication is a cornerstone of SSH security. Properly managing SSH keys is crucial for maintaining a secure infrastructure. This article explores best practices for SSH key management, including the use of OpenSSH certificates, and reviews tools that can automate and enhance the […] Read more »
Uncategorised Advanced SSH Configuration and Security Best Practices May 31, 2024 / September 2, 2025 by Lee Painter SSH (Secure Shell) is a critical tool for securing remote connections, enabling administrators and developers to access and manage remote servers securely. While SSH is inherently secure, advanced configuration can significantly enhance its security posture. This article delves into advanced SSH configurations and best practices to ensure robust security. 1. Key-Based Authentication One of the […] Read more » SSH
Uncategorised File Share Large Files: Simplifying Processes with FileDrop May 28, 2024 / September 2, 2025 by Lee Painter For any company, business or organisation operating today, sharing files is a huge part ofeveryday business. Often this can be a cumbersome task, and the media files shared within them typically have tobe compressed to a lower quality to be sent, or documents have to be sent separately becausethey are too large to be sent […] Read more »
Uncategorised Secure File Exchange “Send To” Browser File Transfers May 15, 2024 / September 2, 2025 by Lee Painter In the era of digital communication, the security of file transfers has never been more critical. With cyber threats evolving daily, ensuring that your data is protected every step of the way is essential. That’s where Jadaptive comes in, offering a cutting-edge solution for secure file exchanges. In a recent promotion video, Ash from Jadaptive […] Read more »
Uncategorised Benefits of TFTP vs SFTP – A Comparison March 12, 2024 / September 2, 2025 by Lee Painter Without a doubt, one of the most important elements of modern computing is file transfers. Different types of transfers are used as different methods of transferring data – two of the main types will be discussed today: TFTP and SFTP. This article will aim to provide a valuable oversight of both TFTP and SFTP, as […] Read more »
Identity Management Passwords Uncategorised Password Fatigue: How To Avoid It February 27, 2024 / September 2, 2025 by Lee Painter Many employees at all kinds of businesses can suffer from password fatigue. It is a very real problem, which can be a struggle to deal with, and often it goes unnoticed. In this article, we will aim to provide a comprehensive analysis of what it is, as well as steps that you can take as […] Read more »
Uncategorised What is an OTP Bot (and How To Protect Yourself) February 14, 2024 / September 2, 2025 by Lee Painter In this article, we will discuss what an OTP bot is, signs that you can look out for to identify it, and how to protect yourself should you need to. We will also discuss how they work and their primary purpose. What is an OTP Bot? An OTP bot is short for a one-time password […] Read more »
Uncategorised MFA Fatigue Attacks: How Can You Protect Your Business? February 14, 2024 / September 2, 2025 by Lee Painter MFA Fatigue Attacks: A Business Protection Guide MFA fatigue attacks are a huge concern for any business, particularly those operating fully within the digital sphere. This article will aim to outline what MFA fatigue attacks are and how they can be prevented. Real-life case study examples will be cited to understand these attacks fully. In […] Read more »
Uncategorised Java Class Files – Here’s How To Protect Them January 5, 2024 / September 2, 2025 by Lee Painter JAVA Protector: How Can You Protect Your Java Class Files? In this article, we will discuss how you can protect your files and some real-life case study examples. Furthermore, we will discuss future security trends, how you can prepare for these, and the advantages and disadvantages of the methods discussed. What Are Java Class Files? […] Read more »
Uncategorised How to mitigate against SSH Vulnerability CVE-2023-48795 with Maverick Legacy Client December 28, 2023 / September 2, 2025 by Lee Painter There are several options available to mitigate the risk of exposure to CVE-2023-48795 for Maverick Legacy Client-enabled applications In code Use the code below before making any call to SshConnector.connect. Using System Properties You do not need to make any code changes if you have a sensitive deployment. By adding the JVM arguments below, you […] Read more »