Blog

Blog

3 Ways Your Peers are Using Secure Forms

If you exchange any amount of sensitive information as paper documents, electronic PDFs, images, or spreadsheets, you know keeping track of data and ensuring it gets where it needs to go can be a challenge. And if you work with multiple parties to receive this information, like employees, vendors, clients, stakeholders, and trading partners, you...
Blog

On-Premises and the Cloud: A Comparison of Two Unique Environments

On-premises. The cloud. Hybrid environments. As technology evolves and business needs grow, organizations are rapidly trying to make sense of their options. What are the benefits of running their software and data on-premises? What concerns should IT and security teams be aware of when implementing their processes in the cloud? Can they do a bit of both and go hybrid? There is no right or wrong...
Blog

15 Ways to Avoid Document Chaos with Secure Forms

Vendors, employees, customers, and trading partners exchange an abundance of files every day, often by a variety of means including mail, email, telecomm apps like Skype, shared file storage like Dropbox or Google Drive, and sometimes even SMS. While documents are an inescapable reality for busy organizations, keeping track of this data can be...
Blog

10 Essential Tips for Securing FTP and SFTP Servers

Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers, putting your FTP or SFTP server at risk of a costly data breach. Bob Luebbe, GoAnywhere Chief Architect at Fortra, hosted a webinar to help you...
Blog

Is Your Data REALLY Safe on the IBM i (AS/400)?

“AS/400 is built to be safe and reliable.” “No one makes viruses for the IBM i. There are no known cases of malware, either.” “IBM has amazing IBM i server security, so we don’t have to worry about vulnerabilities.” Do these statements sound familiar? Perhaps you’ve come across these claims in the industry, heard someone say something similar...
Blog

Managed File Transfer: It's More than SFTP

For many, MFT and SFTP are a package deal. You can’t seem to have a managed file transfer solution without relying on an SFTP server to secure your file transfers. But this leaves a lot of people wondering—is managed file transfer only useful for SFTP file transfer automation? The reality is, MFT is far more than just an SFTP (SSH File Transfer...
Blog

5 Ways to Protect Your Financial Organization from a Data Breach

While several industries, including business and education, make up a big portion of yearly data breach counts, banks and credit unions aren’t left risk free. According to the Identity Theft Resource Center (ITRC), the banking/credit/financial sector totals 5.8% of 2017’s data breaches as of June 30, 2017. That’s up two percent from 2016’s first...
Blog

Are SSH Keys or Passwords Better for SFTP Authentication?

SFTP passwords or SSH keys? That’s the question often asked by IT professionals when setting up authentication on an SFTP server. There’s some debate on whether SSH keys or passwords are better at protecting and validating company SFTP servers, and the consensus is never official. Questioning what the best SFTP security best practice is doesn't...
Blog

Data Breach and Incident Response Plans | 2017 Templates & Resources

As we continue to put our data online, through social media channels, cloud storage, and email attachments, we open ourselves up to the possibility of data breaches and other attacks. The answer to this problem isn’t to stop using the internet, of course. But organizations today need to pay serious attention to their cybersecurity gaps, put...
Blog

WinSCP Free SFTP Client or an MFT SFTP Client?

If you’re looking for a SFTP client to use for your organization’s file transfers, it might be tempting to go with one that’s free—and bonus points if it’s open source. Often enough, these SFTP clients meet the minimum requirements for most network administrators, they’re easy to install (without taking up much space on your hard drive), and they...
Blog

EFSS vs. MFT: What's the Difference?

EFSS (Enterprise File Sync and Share) and MFT (Managed File Transfer) are two terms that are frequently thrown around in the IT industry. Each solution is used to transfer files to multiple locations and devices, and they can both be deployed on-premises or in a cloud environment. These similarities inspire frequent questions. What are these...
Blog

5 Best Practices for IBM i File Transfers

Using IBM’s built-in FTP and Open SSH servers to transfer files to and from your IBM i systems can be time-consuming, if not simply riddled with fine details. From scripting knowledge to running specific (and sometimes obscure) commands, there’s a lot to consider—and the safety and integrity of your files is probably at the top of the list. ...
Blog

What to Consider When Selecting Managed File Transfer Software

You’re at work, at least five programs open on your computer as you tweak the custom Linux shell and Python scripts that allow you to transfer dozens of company files from one destination to another. Commands pour from your fingers as you check the transfers for successful delivery. Some of them failed; you troubleshoot why, then hit submit and...
Blog

Are Your Electronic Health Records (EHRs) Secure?

Since moving to Electronic Health Records and modern EHR technology, the healthcare industry has taken great strides to enhance patient care, internal workflows, and business-to-business communication. These improvements bring organizations closer and closer to full integration with others in the industry; a goal that will, once fully achieved,...
Blog

30 Ways to Simplify Life with Advanced Workflows

Are you using GoAnywhere’s Advanced Workflows yet? If not, you’re missing out. What are Workflows? Workflows are projects you can create in GoAnywhere MFT to define your file transfers and improve your business processes. Each project is able to contain multiple tasks that execute in a seamless end-to-end workflow. Pretty neat, right? Why Use...
Blog

Two Cybersecurity Takeaways from the Equifax Data Breach

It’s been nearly a week since Equifax went public with knowledge of a massive data breach—perhaps one of the biggest to date. There’s no word yet on who is or isn’t affected, but it’s very likely that 143 million Americans (45% of the U.S. population and 80% of those who have a credit report) are now at risk of identity theft. What data was...
Blog

How Often Should You Change Your Password?

“Your password will expire in X days.” That pop-up or email is all-too-familiar for employees at organizations requiring login credentials with the common “90- or 45-day rule” for changing or updating passwords. It’s a security best practice designed to help keep your accounts—and your organization—secure from hackers and nosy coworkers. But does...
Blog

Why You Should Implement a Third Party Vendor Assessment Program

Third party vendors are incredibly useful. They allow businesses to automate certain processes they can’t do themselves, like implement payroll services to compensate employees, and bridge gaps in their technology. But while the money, time, and brainpower freed up by outsourcing tasks is a huge positive, third party vendors have their downsides....
Blog

The Benefits of Empowered Employees: Why a Good Security Awareness Program Matters

Every organization dreams of how they’d like to implement cybersecurity successfully. In dreams, the execution is perfect: requirements would be met or exceeded, employees would be fully educated on security risks, and data would never be threatened by renegade phishing scams or careless user errors. But in reality, faced with time and resource...
Blog

10 Easy Ways to Protect Your Data at Work

In a recent survey of UK workers, over half the employees who participated across 1,000 organizations admitted that they open suspicious email attachments. More than 80% also said they open strange attachments if the sender appears to be someone they know, and “one in five said the business they work for has no policy on how to handle email attachments, or they have not been made aware of it.” ...