Resources

Blog

How to Transfer Files Faster

There are many options for transferring files but not all of them can complete file transfers quickly. When considering transfer distance length and bandwidth predicaments, the speed of file transfers can be called into question even more easily. So, what tools can organizations use to achieve file transfers at high speeds to save time and money without sacrificing core security functionality? If...
Blog

HTTP vs. TCP: What's the Difference?

  HTTP vs. TCP Hypertext Transfer Protocol (HTTP) and Transmission Control Protocol (TCP) are both computer protocols involved in the transfer of data, but while they individually serve their own purpose, they have a close relationship. Let’s break down what HTTP and TCP actually are, what sets them apart, and how they work as a pair. What is HTTP? ...
Blog

What Are the Current Cyber Threat Trends in 2021?

  Many current cyber threat trends hinge on change and uncertainty caused by the COVID-19 pandemic. Whether it’s a panicked email recipient falling for a phishing scheme, innovations in ransomware, or simply remote workforces offering larger surfaces to attack, the goal of each is to find gaps in your company’s cyber security armor. Here are the old,...
Blog

Is SFTP a Good Choice for Enterprise-level MFT?

  Organizations large and small face hundreds of decisions each day – some more critical than others, but all with potentially large-scale impact on employees, trading partners, and customers. When it comes to deciding how to best collaborate and share often-sensitive, proprietary files across your organization, carefully weighing available file...
Blog

What is Ransomware-as-a-Service (RaaS)?

    What is Ransomware-as-a-Service (RaaS)?   Ransomware-as-a-Service (RaaS) is a new pay-for-use business model used by ransomware developers where malicious actors (known as affiliates) can outsource or lease already-developed ransomware attacks the same way legitimate software developers lease Software-as-a-Service (SaaS) products. Because RaaS...
Blog

This Month in Cybersecurity: E-Reader Threats and More

    In the last month, a lot has happened in the world of cybersecurity. Cyber threats are more numerous than ever before, which has brought both private sector and government organizations to take remediation actions seriously. Let’s break down some of the biggest stories of the last month. Israeli...
Blog

Need Fast File Transfers? FileCatalyst Delivers.

  Got a Need for Speed? FileCatalyst Can Deliver. “How fast?" If that’s the very first thing that comes to mind when thinking about transferring files, you clearly have a need for speed. And if file transfer speed is critical to your business operations, FileCatalyst by Fortra may be the right match for you. Fortra acquired FileCatalyst in early 2021...
Blog

The Top Tips for Optimizing File Transfer Productivity

  The Top Two Tips for Optimizing File Transfer Productivity Transferring data securely from point A to point B is a non-negotiable for most organizations. However, that doesn’t mean that the process needs to be tedious. Don’t get bogged down by old file transfer methods that are slow and unreliable. Rather, optimize your productivity with the...
Blog

Ransomware Attacks on Small Businesses: How to Mitigate

  More than fireworks exploded as Americans were prepping for Independence Day celebrations as hundreds of companies awoke on July 3rd to yet another massive ransomware attack. This attack attempted to cripple the networks of up to 200 companies and up to 1,500 downstream businesses. All signs point to it being the handiwork of a ransomware...
Blog

This Month in Cybersecurity: Bolstering Defenses and Best Practices

  Every day, cybersecurity becomes more important for businesses. Organizations have a need to protect their customer data and the number of attacks that businesses have experienced has increased. The bottom line is that cybersecurity news and best practices are important to pay attention to. Without further ado, let’s get into some of the latest news...
Blog

3 Reasons to Enhance MFT With Fast File Transfer Solutions

  For many organizations, the first step toward optimizing workflows and sharing information securely is adopting a managed file transfer (MFT) solution. This is a major step that can change a lot in the way organizations conduct their business and the bottom line is that it can be a lucrative and much more secure decision to make. That being said,...
Blog

The Biggest Cyber Risks Organizations Face Today

    Today’s Biggest Cyber Risks   When your organization handles sensitive data on a consistent basis, the looming threat of cyber risks is around every corner. Although cyber threats aren’t going anywhere anytime soon, the good news is that resources like cyber threat intelligence metrics can help with analyzing risks and understanding which...
Blog

Why Banking Growth in Latin America Correlates with Cybercrime

    Bancarization is Exploding in Latin America Latin America is the fastest-growing banking market worldwide, and growth is only expected to continue. Forecasts are anticipating 10 percent increases across all Latin American banking sectors through 2022. Bancarization refers to both the amount of access and the degree of usage of financial services...
On-Demand Webinar

What’s New with FileCatalyst? June 2021

FileCatalyst partner webinar covering a product overview, how it fits into the Fortra MFT suite, recent product updates, and more! As of May 31, FileCatalyst Direct 3.8.3 is available. This webinar will highlight the key features most recently added to FileCatalyst Direct, such as: • New proxy mechanism for certain environments • Transfer improvements for files with reserved characters • New...
Blog

How to Use Cloud Data Transfer Solutions Effectively

  What is Cloud Data Transfer and Why Do Organizations Use It? Cloud data transfer is a process of moving data to and from a cloud computing environment. There are various needs that cloud transfers fulfill: one type of cloud data transfer takes data from a local, on-premises data center and brings it to the cloud. Another type of transfer moves data...
Blog

Top 12 File Transfer Frustrations

  Sending and exchanging files is a vital daily task in most organizations. However, this responsibility to exchange information comes with some pretty common frustrations and risks unless the file transfer process is secure and managed appropriately. Here are a few of the biggest frustrations in file transfers and some solutions to help alleviate them...
Blog

5 Topics You Should Know About in the World of Cybersecurity

    Every year, organizations work hard to protect their data and analyze potential risks to it. However, as we’ve seen recently, the number of cybersecurity risks and data breaches has risen sharply. This makes it even more important to keep up with the newest cybersecurity guidelines and news so you can prepare your organization in the most...
Press Release

Scammers Access 50% of Compromised Accounts Within 12 Hours According to New Research

FOSTER CITY, Calif. and LONDON (June 8, 2021) — Agari by Fortra, the market share leader in phishing defense for the enterprise, unveiled today the results of an investigation into the anatomy of compromised email accounts. The threat intelligence brief, titled Anatomy of a Compromised Account, is the first research of its kind, showcasing how threat actors use credential phishing sites to gather...
Blog

What is Enterprise SFTP Software?

  What is Enterprise SFTP Software? The primary job of all SFTP software is to move files over a secure shell (SSH) connection. SFTP software can exist as a standalone tool, or as part of a larger software solution, such as managed file transfer (MFT). SFTP software can be made up of a client, a server, or both together. What distinguishes enterprise...
Blog

TFTP vs. FTP vs. FileCatalyst: What is the Difference?

Transferring files over the internet is a common task in today’s digital world and it’s important to  protocol that fits your organization’s needs. A protocol is a set of rules and messages between a sender and a receiver. It functions much like a language that both ends of the network understand so the data arrives uncorrupted and with a proper file name. When it comes time to choose a protocol,...