Blog

Blog

How to Achieve Fast Uploads to Cloud Storage

We see a lot of confusion among IT professionals about the pros/cons of cloud-based object storage like Amazon S3 and Microsoft Azure Blob. There tends to be a general lack of awareness regarding the smaller players, like Backblaze B2 and Wasabi for instance, and their benefits. The most confusion, however, revolves around migrating data to these various cloud storage solutions, and how it can be...
Blog

A Day In Data: How Much Data We Generate and Consume in a Day

I‘ve been thinking about the amount of data created and consumed in a single day, and it got me curious to look into the figures. I found the results very interesting – so I thought I would make an infographic to visualize my findings. I decided to focus on the more personal, everyday tasks most people perform in a day, such as emails and social...
Blog

3 Ways Your Peers are Using Secure Forms

If you exchange any amount of sensitive information as paper documents, electronic PDFs, images, or spreadsheets, you know keeping track of data and ensuring it gets where it needs to go can be a challenge. And if you work with multiple parties to receive this information, like employees, vendors, clients, stakeholders, and trading partners, you...
Blog

On-Premises and the Cloud: A Comparison of Two Unique Environments

On-premises. The cloud. Hybrid environments. As technology evolves and business needs grow, organizations are rapidly trying to make sense of their options. What are the benefits of running their software and data on-premises? What concerns should IT and security teams be aware of when implementing their processes in the cloud? Can they do a bit of both and go hybrid? There is no right or wrong...
Blog

15 Ways to Avoid Document Chaos with Secure Forms

Vendors, employees, customers, and trading partners exchange an abundance of files every day, often by a variety of means including mail, email, telecomm apps like Skype, shared file storage like Dropbox or Google Drive, and sometimes even SMS. While documents are an inescapable reality for busy organizations, keeping track of this data can be...
Blog

The GDPR is Coming… What’s it Mean to You?

There is a new wave of regulation coming in the form of the European Union Data Protection Regulation (EU GDPR). These provisions and regulations have been in development over the last four years, and starting May 25th, 2018; it will begin to be enforced. After that date, substantial fines will be imposed on those who don’t comply with new regulations. Before we dive into what this will mean for...
Blog

Is Your Data REALLY Safe on the IBM i (AS/400)?

“AS/400 is built to be safe and reliable.” “No one makes viruses for the IBM i. There are no known cases of malware, either.” “IBM has amazing IBM i server security, so we don’t have to worry about vulnerabilities.” Do these statements sound familiar? Perhaps you’ve come across these claims in the industry, heard someone say something similar...
Blog

Uploading Files Into Azure Blob Storage at Multi-Gigabit Speeds

Moving data into cloud storage can present a number of challenges for organizations across all industries. Some of these challenges include finding a tool that can simplify the process and a solution that can move the data to the cloud as fast as possible. This blog will examine two methods used to transfer files into Microsoft Azure Blob storage: using Microsoft’s tool AzCopy and using...
Blog

5 Ways to Protect Your Financial Organization from a Data Breach

While several industries, including business and education, make up a big portion of yearly data breach counts, banks and credit unions aren’t left risk free. According to the Identity Theft Resource Center (ITRC), the banking/credit/financial sector totals 5.8% of 2017’s data breaches as of June 30, 2017. That’s up two percent from 2016’s first...
Blog

Data Breach and Incident Response Plans | 2017 Templates & Resources

As we continue to put our data online, through social media channels, cloud storage, and email attachments, we open ourselves up to the possibility of data breaches and other attacks. The answer to this problem isn’t to stop using the internet, of course. But organizations today need to pay serious attention to their cybersecurity gaps, put...
Blog

EFSS vs. MFT: What's the Difference?

EFSS (Enterprise File Sync and Share) and MFT (Managed File Transfer) are two terms that are frequently thrown around in the IT industry. Each solution is used to transfer files to multiple locations and devices, and they can both be deployed on-premises or in a cloud environment. These similarities inspire frequent questions. What are these...
Blog

5 Cloud Security Best Practices for Microsoft Azure

Migrating company data to the cloud is often a primary goal for modern organizations. In fact, by 2018, 60% of organizations’ IT infrastructure will be cloud-based, according to IDG’s Enterprise Cloud Computing Survey. Cloud infrastructure comes with many benefits, including—but not limited to—reducing IT budgets, improved data security, endless...
Blog

5 Best Practices for IBM i File Transfers

Using IBM’s built-in FTP and Open SSH servers to transfer files to and from your IBM i systems can be time-consuming, if not simply riddled with fine details. From scripting knowledge to running specific (and sometimes obscure) commands, there’s a lot to consider—and the safety and integrity of your files is probably at the top of the list. ...
Blog

Are Your Electronic Health Records (EHRs) Secure?

Since moving to Electronic Health Records and modern EHR technology, the healthcare industry has taken great strides to enhance patient care, internal workflows, and business-to-business communication. These improvements bring organizations closer and closer to full integration with others in the industry; a goal that will, once fully achieved,...
Blog

30 Ways to Simplify Life with Advanced Workflows

Are you using GoAnywhere’s Advanced Workflows yet? If not, you’re missing out. What are Workflows? Workflows are projects you can create in GoAnywhere MFT to define your file transfers and improve your business processes. Each project is able to contain multiple tasks that execute in a seamless end-to-end workflow. Pretty neat, right? Why Use...
Blog

Two Cybersecurity Takeaways from the Equifax Data Breach

It’s been nearly a week since Equifax went public with knowledge of a massive data breach—perhaps one of the biggest to date. There’s no word yet on who is or isn’t affected, but it’s very likely that 143 million Americans (45% of the U.S. population and 80% of those who have a credit report) are now at risk of identity theft. What data was...
Blog

How Often Should You Change Your Password?

“Your password will expire in X days.” That pop-up or email is all-too-familiar for employees at organizations requiring login credentials with the common “90- or 45-day rule” for changing or updating passwords. It’s a security best practice designed to help keep your accounts—and your organization—secure from hackers and nosy coworkers. But does...
Blog

7 Cloud Security Best Practices for Amazon Web Services

Temporary and permanent storage of data in the cloud has grown in popularity over the years. Companies like Land O’Lakes and Boeing moved their information to the cloud last year to simplify the technology they used. Video-streaming behemoth Netflix finished their journey to the cloud in early 2016 after seven years of moving systems and customer...
Blog

Why You Should Implement a Third Party Vendor Assessment Program

Third party vendors are incredibly useful. They allow businesses to automate certain processes they can’t do themselves, like implement payroll services to compensate employees, and bridge gaps in their technology. But while the money, time, and brainpower freed up by outsourcing tasks is a huge positive, third party vendors have their downsides....
Blog

The Benefits of Empowered Employees: Why a Good Security Awareness Program Matters

Every organization dreams of how they’d like to implement cybersecurity successfully. In dreams, the execution is perfect: requirements would be met or exceeded, employees would be fully educated on security risks, and data would never be threatened by renegade phishing scams or careless user errors. But in reality, faced with time and resource...