Blog

Blog

Summary of the Investigation Related to CVE-2025-10035

We have completed our investigation of suspicious activity related to our Fortra GoAnywhere MFT solution that resulted in CVE-2025-10035. This post summarizes our findings. What Happened: On Sept. 11, 2025, we began investigating a potential vulnerability reported by a customer. After identifying the issue, Fortra developed and released hotfixes for supported versions and updated the product to...
Blog

9 Data Retention Recommendations

Professional organizer, Marie Kondo might say, "The best way to choose what to keep and what to throw away is to ask yourself, "'Does this spark joy?'" She goes on to recommend people keep items that do and dispose of those that don't. While this approach may be suitable for tidying up the storage room, managing organizational data retention requires a more comprehensive set of recommendations...
Blog

IT Troubleshooting 101

General purpose IT troubleshooting is a dying art. Of course, you can go online and find all kinds of videos and blogs on how to troubleshoot specific issues. Or with a few clicks fire up robust tools like AI search engines (such as Perplexity) or AI assistants with broad capabilities (such as ChatGPT), which are capable of generating human-like text, answering questions, and performing various...
Blog

ViDA Compliance: MFT Supports Data Sovereignty and Security

What is the ViDA Initiative and When is it Effective?The European Commission is driving digital transformation through its ViDA (VAT in the Digital Age) initiative. Organizations worldwide must prepare now or risk compliance penalties. The ViDA requirement was adopted in March 2025 and is currently in a rollout stage that is to occur over the next several years, with certain parliaments enforcing...
Blog

File Transfer Challenges and Solutions in Marine Environments

Expecting smooth sailing when transferring sensitive files ship-to-shore, ship-to-ship, or shore-to-ship? Without a robust, accelerated file transfer solution in place expect to encounter some rough waters in terms of reliability, speed, and integrity.When at-sea connectivity challenges exist, such as with high latency or unstable bandwidth, and the reliability of file transfers is imperative, you...
Blog

How Managed File Transfer (MFT) Can Strengthen the Supply Chain

Moving essential goods or services across the country or around the world is an industry many people don’t give much thought to, unless of course a shipment is late or misdirected, or when geopolitical shifts alter the course of “normal” supplies. This critical function of modern life, with a market projected to near $31 billion by 2026, is not without risk or disruptions. And these risks can come...
Blog

8 Ways Credit Unions Gain Security, Compliance & Efficiency with MFT

When it comes to cybercrime, credit unions are no less targeted than large, multi-national banking institutions. After all, if money talks, cybercrime targeting financial institutions screams. According to Security Magazine, 64% of surveyed financial institutions experienced a cyberattack in 2024. And according to an American Banking Journal article, the average cost of a financial sector data...
Blog

Uploading Big Data for Employees While on the Road

Land surveyors, film production crews, power line and gas pipeline inspectors, news reporters, and accident investigators all have a few things in common. First, they are almost always on the road and second, they need to collect a lot of digital information that needs to be uploaded to the home office quickly and reliably.Achieving big data transfers from the road doesn’t have to be laborious or...
Blog

Secure File Transfers from Unsecured Locations: What to Know

Whether you're working from a coffee shop or reviewing sensitive files from a hotel room while traveling, today’s workforce thrives and often demands flexibility. But this work-from-anywhere convenience comes with risk—especially when accessing or transferring sensitive data over unsecured networks. Public Wi-Fi or mobile hotspots can get you connected when away, but they can also open the door to...
Blog

UDP Technology: Essential When Transferring Big Data Over Satellite

Organizations expect security and stability when sending sensitive files. However, achieving these goals can get a bit tricky without robust and accelerated file transfer software—especially when using satellite services. Internet over satellite has been around since the mid-1990s using traditional data satellites such as VSAT, HughesNet, and Iridium – all which operate in geo-stationary orbit (22...
Blog

Ransomware and Disaster Recovery: Create a Plan for Your Data

Disasters come in many forms —floods, earthquakes, hurricanes and tornadoes — all with the power to destroy or seriously impact your organization’s data. And cybercrime disasters, such as ransomware can create disastrous results of their own. In today’s cybersecurity landscape, ransomware probably has a higher chance of hitting your organization than those unfortunate weather-related crises. And...
Blog

Key MFT Protocols and Their Security Implications

Deciding how to securely send files doesn’t have to be difficult. There are plenty of file transfer protocols that can do the job efficiently and securely (as well as a few that should be out of consideration).File Transfer Protocols and Their Security ConsiderationsFTP (File Transfer ProtocolSecurity considerations: Transmission of files is unencrypted, and data is sent in plaintext (including...
Blog

Stop Bad IPs Continually with GoAnywhere’s Threat Brain

In today’s cybersecurity environment, every bit of proactive defense helps to deter bad actors from entering and hanging around with potentially malicious intent. As a countermeasure, GoAnywhere MFT recently integrated Threat Brain – unique built-in threat intelligence feature which aggregates indicators from Fortra’s deep portfolio of cybersecurity solutions to continuously identify and block IPs...
Blog

GoAnywhere v7.8 Brings More Performance to File Transfers

What’s New in GoAnywhere? Version 7.8 Moves Closer to File Acceleration IntegrationGoAnywhere MFT has released v7.8, the latest version of the software Info-Tech rated #1 in the MFT sector for four years running. This latest release, along with new releases of Gateway and Agents, enhances security, performance, efficiency, and reliability.“Many customers are hitting network and performance...
Blog

MFT in the Cloud: Key Considerations

If your organization wants to add the ability to transfer files via the cloud or even completely convert from an on-premises solution to a cloud solution for convenience or cost-effectiveness, there are a few considerations to help ensure the data entrusted to you is protected and managed.Primarily, you’ll want to confirm that moving all or some of your file exchanges to the cloud:Maintains robust...
Blog

How MFT Supports Data Governance

Managed File Transfer (MFT) solutions are designed to ensure that data is secure, controlled, and compliant as it moves between and within organizations. As such, they play a critical role in broader data governance policies and guidelines. What is Meant by Data Governance? Data governance can be described as the comprehensive process used to control the security, integrity, availability, use,...
Blog

What Is an SFTP Port and Why Does It Matter?

If you need to establish a secure connection between a client and server to transfer business-critical or sensitive files, an SFTP (Secure File Transfer Protocol) port is a strong choice for securing data in transit. The SFTP port is a network port used to establish a secure connection or communication channel between the client and the server. It ensures that during transit, data is encrypted...
Blog

Sharing Files with Mobile Devices: What to Know

The debate on whether an organization should allow employees to bring their own devices (BYOD) to work has both its champions and its naysayers. Regardless of which side your organization falls on letting employees use their personal phones or tablets, it is still vital to ensure that activities, including exchanging and collaborating on files, are done securely.Benefits of a BYOD PositionThere...
Blog

Streamlining Government File Sharing with MFT

Efficiency: It’s a goal that’s permeating conversations in government circles at all levels lately (and other industries as well). Whether that aim is eliminating cumbersome processes or error-prone legacy systems, nearly every department and entity (including contractors working with government entities) are aiming for a more streamlined way of doing more with less – less effort, fewer personnel,...
Blog

How MFT Supports PCI CP Compliance Through Secure File Transfers

You may have heard about PCI DSS, but if you’re familiar with PCI CP (Payment Card Industry Card Production and Provisioning), chances are you’re a credit card manufacturer (or somewhere in the supply chain). And you also likely understand the risks of insecure file transfers in the PCI CP process. To level-set, we’ll review the basics of PCI CP requirements, and how GoAnywhere Managed File...