Selecting a Secure Transfer Method
Using FIPS 140-2 Validated Cryptography
Checking File Integrity
Configuring Firewalls