Blog

Blog

What are the Secure Messaging Standards in Australia?

Secure Messaging in HealthcareHealthcare is essential to live a healthy life, but it shouldn’t come at the expense of your privacy.Healthcare is an industry that will always be growing, which means that if your situation transitions to a place where you need to see a new doctor or a specialist, your very private and personal health records will need...
Blog

What is the California Consumer Privacy Act?

The California Consumer Privacy Act (CCPA), the latest data privacy law in the Golden State, went into effect on January 1st, 2020. Some have compared it to the UK’s GDPR (General Data Protection Regulation), and they’re not far off – like the GDPR, the CCPA is intended to protect individuals’ private data by making data collection and usage more...
Blog

8 Surprising Ways to Use GoAnywhere's Secure Folders Module

What is Secure Folders? Secure Folders is a licensed module GoAnywhere MFT offers its users. It provides access to authorized files and folders on the server or network location through a HTTPS Web Client. However, it can do so much more with its array of features. Read on to learn 8 surprising ways to use GoAnywhere’s Secure Folders module....
Blog

What is PIPEDA?

PIPEDA, the Personal Information Protection and Electronic Documents Act, is a privacy law that applies to private-sector organizations and businesses throughout Canada.The goal of PIPEDA is to ensure that all provinces and territories protect personal data. This includes:Asking for and obtaining consent when an individual’s information is initially...
Blog

How Banks are Benefiting from MFT Integration

Trying to integrate and tie diverse internal and external banking applications, branches, systems and trading partners together so they work seamlessly with internal and central banking applications can have your IT department constantly untangling complex knots to ensure transactions and information flows easily.There is a way to untangle this...
Blog

PDPA in Singapore Helps Protect Personal Data

What is the PDPA of 2012?The Personal Data Protection Act of 2012 (PDPA) is a law designed to regulate and enforce the proper collection, use, disclosure, and care of the personal data of citizens in the Republic of Singapore. The Personal Data Protection Commission (PDPC) is charged with establishing policies and for reviewing organizational actions...
Blog

Should You Use a File Sharing App?

Should You Use a File Sharing App?File sharing apps like Dropbox and Google Drive certainly have their appeal. They are user-friendly, often free, and do the job of getting information from one user to another. Until they don’t.Or, until your files are hacked, get into the wrong hands, live in infamy, have unrestricted access, or are manipulated...
Blog

7 Essential Resources on PCI DSS Security

Note from the Editor: This article was originally published in February 2017. It has been updated with resources current to PCI DSS version 3.2.1.Did you know that 80% of organizations are not compliant with PCI DSS requirements? That means, if you’re reading this, there’s a pretty good chance your company needs to make adjustments to ensure a fully...
Blog

What is Secure File Sharing?

What is Secure File Sharing?Secure is the operative word here. Dozens of applications allow you to transfer files – small to large – between different users or organizations. A secure file transfer solution, at its most basic, secures the movement of files while at rest and in transit confidentially – all within a protected mode.Secure file transfer...
Blog

Should You Get Extended Customer Support? FileCatalyst’s Top 3 Reasons Why It’s Worth It

Whether you are purchasing the next trending iPhone or a powerful fast file transfer solution, support is always a bonus feature that provides you a team in your back corner. This sense of security takes a weight off of your shoulders because you know that assistance will be there to alleviate the stress that comes with updates, crashes, and more. Support is undervalued within the world of...
Blog

Netflix Series Black Mirror, Highlights Data Protection– 3 Reasons Why You Should Listen

For good or for bad, the popular NetFlix television show, Black Mirror has global audiences overwhelmed with the future possibilities for technology. The show’s creators appear to have sought out the most extreme plotlines around technological threats, leaving us with digital nightmares. While Black Mirror mainly tackles the negative aspects of the potential advancement in technology, it does...
Blog

Meeting IT Security and Compliance Requirements with GoAnywhere MFT

Meet your IT and compliance requirements easily with GoAnywhere MFT. GoAnywhere helps organizations and IT professionals comply with an array of strict regulations, methods, and technologies. To open a larger, clickable image, choose the "Download" option below.DOWNLOAD For more of an in-depth look into...
Blog

GDPR: Understanding the 8 Rights of Data Subjects

Find out what these new rights mean for your organization and how you can prepare. GDPR (General Data Protection Regulation) is the EU’s new legal framework that replaced the EU Data Protection Directive in May 2018. While the directive was merely a recommendation, GDPR carries the force of law. The purpose of GDPR is similar to...
Blog

Why Choose Managed File Transfer Over Free File Sharing Methods?

Why Choose Managed File Transfer?It’s no secret that many organizations struggle to fully protect the sensitive data their employees, customers, trading partners, and third-party vendors share.Free file sharing software and scripts are both common ways of transferring files, even though they’re not necessarily the most secure, can be complex, and lack...
Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll want to pay close attention...
Blog

I’ve Just Been Breached, Now What?

So, you think (or perhaps you know) you’ve been breached. It’s every organization’s nightmare, and you’re living it, facing local and federal fines, upset customers, public panic, and a loss of intellectual property. A breach can be a harrowing ordeal; if you’re not sure what to do immediately after discovering the breach, your situation can...
Blog

What is a DMZ and Why Do You Need a DMZ Secure Gateway?

If you’ve watched a science-fiction movie about space travel, then you’ve likely seen some version of a scene in which an astronaut reenters their ship from the outside abyss. Because the ship exists as a haven from the dangerous environment of empty space, the astronaut cannot simply open the door and stroll directly into the cockpit. To do so would...
Blog

How 3 Financial Institutions Solve File Transfer Needs with MFT Software

On a scale of 1-10, how would you rate the efficiency of your file transfers right now?If you use manual scripts, legacy software, or a myriad of free tools to balance your encryption, automation, cybersecurity, reporting, and collaboration needs, it’s possible you’ll rate your efficiency low on the scale. After all, professionals in banking and...
Blog

High-Performance Computing (HPC) in Oil & Gas

When it comes to the digital oilfield, High-Performance Computing (HPC) is an asset to be relied upon. From upstream discovery and the mapping of ocean floors to production, optimization and design; powerful HPC systems are analyzing, interpreting and manipulating unfathomable amounts of data.FileCatalyst has been helping a number of natural resources companies accelerate their workflows by moving...
Blog

AI Across Industries – Where We Are, Where We’re Going

HAL 9000 might be closer, more useful and friendlier than we think. Artificial Intelligence (AI) might not be here in a fully realized form yet, but it’s already disrupting a lot of industries that we work in.As our customers discuss, question and evaluate the ways they can leverage AI to help streamline their workflows, I thought that I’d share some of the ways industry leaders leverage AI across...