Blog

Blog

Globus Toolkit to End Support after 20 Years

The Globus Toolkit has been an open source project since its inception, allowing the community to provide enhancements that have made it what it is today. But after a nearly 20-year run as what many see as the benchmark of grid computing, the Globus team at the University of Chicago will no longer support the Globus Toolkit. One of the toolkit’s...
Blog

From the Magnetic Drum to the Cloud - A Brief History of Data Storage

In my earlier blog post, “A Day In Data: How Much Data We Generate and Consume in a Day” I examined the common data-related tasks and the amounts of data these tasks generate and consume in a day. When I finished my research, I was blown away by some of the figures I found. Did you know that 2.9 million emails are sent every second?! Or how about...
Blog

How to Achieve Fast Uploads to Cloud Storage

We see a lot of confusion among IT professionals about the pros/cons of cloud-based object storage like Amazon S3 and Microsoft Azure Blob. There tends to be a general lack of awareness regarding the smaller players, like Backblaze B2 and Wasabi for instance, and their benefits. The most confusion, however, revolves around migrating data to these various cloud storage solutions, and how it can be...
Blog

A Day In Data: How Much Data We Generate and Consume in a Day

I‘ve been thinking about the amount of data created and consumed in a single day, and it got me curious to look into the figures. I found the results very interesting – so I thought I would make an infographic to visualize my findings. I decided to focus on the more personal, everyday tasks most people perform in a day, such as emails and social...
Blog

The GDPR is Coming… What’s it Mean to You?

There is a new wave of regulation coming in the form of the European Union Data Protection Regulation (EU GDPR). These provisions and regulations have been in development over the last four years, and starting May 25th, 2018; it will begin to be enforced. After that date, substantial fines will be imposed on those who don’t comply with new regulations. Before we dive into what this will mean for...
Blog

10 Essential Tips for Securing FTP and SFTP Servers

Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers, putting your FTP or SFTP server at risk of a costly data breach. Bob Luebbe, GoAnywhere Chief Architect at Fortra, hosted a webinar to help you...
Blog

Is Your Data REALLY Safe on the IBM i (AS/400)?

“AS/400 is built to be safe and reliable.” “No one makes viruses for the IBM i. There are no known cases of malware, either.” “IBM has amazing IBM i server security, so we don’t have to worry about vulnerabilities.” Do these statements sound familiar? Perhaps you’ve come across these claims in the industry, heard someone say something similar...
Blog

Managed File Transfer: It's More than SFTP

For many, MFT and SFTP are a package deal. You can’t seem to have a managed file transfer solution without relying on an SFTP server to secure your file transfers. But this leaves a lot of people wondering—is managed file transfer only useful for SFTP file transfer automation? The reality is, MFT is far more than just an SFTP (SSH File Transfer...
Blog

Uploading Files Into Azure Blob Storage at Multi-Gigabit Speeds

Moving data into cloud storage can present a number of challenges for organizations across all industries. Some of these challenges include finding a tool that can simplify the process and a solution that can move the data to the cloud as fast as possible. This blog will examine two methods used to transfer files into Microsoft Azure Blob storage: using Microsoft’s tool AzCopy and using...
Blog

5 Ways to Protect Your Financial Organization from a Data Breach

While several industries, including business and education, make up a big portion of yearly data breach counts, banks and credit unions aren’t left risk free. According to the Identity Theft Resource Center (ITRC), the banking/credit/financial sector totals 5.8% of 2017’s data breaches as of June 30, 2017. That’s up two percent from 2016’s first...
Blog

Are SSH Keys or Passwords Better for SFTP Authentication?

SFTP passwords or SSH keys? That’s the question often asked by IT professionals when setting up authentication on an SFTP server. There’s some debate on whether SSH keys or passwords are better at protecting and validating company SFTP servers, and the consensus is never official. Questioning what the best SFTP security best practice is doesn't...
Blog

Data Breach and Incident Response Plans | 2017 Templates & Resources

As we continue to put our data online, through social media channels, cloud storage, and email attachments, we open ourselves up to the possibility of data breaches and other attacks. The answer to this problem isn’t to stop using the internet, of course. But organizations today need to pay serious attention to their cybersecurity gaps, put...
Blog

WinSCP Free SFTP Client or an MFT SFTP Client?

If you’re looking for a SFTP client to use for your organization’s file transfers, it might be tempting to go with one that’s free—and bonus points if it’s open source. Often enough, these SFTP clients meet the minimum requirements for most network administrators, they’re easy to install (without taking up much space on your hard drive), and they...
Blog

Are Your Electronic Health Records (EHRs) Secure?

Since moving to Electronic Health Records and modern EHR technology, the healthcare industry has taken great strides to enhance patient care, internal workflows, and business-to-business communication. These improvements bring organizations closer and closer to full integration with others in the industry; a goal that will, once fully achieved,...
Blog

Two Cybersecurity Takeaways from the Equifax Data Breach

It’s been nearly a week since Equifax went public with knowledge of a massive data breach—perhaps one of the biggest to date. There’s no word yet on who is or isn’t affected, but it’s very likely that 143 million Americans (45% of the U.S. population and 80% of those who have a credit report) are now at risk of identity theft. What data was...
Blog

Why You Should Implement a Third Party Vendor Assessment Program

Third party vendors are incredibly useful. They allow businesses to automate certain processes they can’t do themselves, like implement payroll services to compensate employees, and bridge gaps in their technology. But while the money, time, and brainpower freed up by outsourcing tasks is a huge positive, third party vendors have their downsides....
Blog

The Benefits of Empowered Employees: Why a Good Security Awareness Program Matters

Every organization dreams of how they’d like to implement cybersecurity successfully. In dreams, the execution is perfect: requirements would be met or exceeded, employees would be fully educated on security risks, and data would never be threatened by renegade phishing scams or careless user errors. But in reality, faced with time and resource...
Blog

10 Easy Ways to Protect Your Data at Work

In a recent survey of UK workers, over half the employees who participated across 1,000 organizations admitted that they open suspicious email attachments. More than 80% also said they open strange attachments if the sender appears to be someone they know, and “one in five said the business they work for has no policy on how to handle email attachments, or they have not been made aware of it.” ...
Blog

USPS Eliminates FTP, Requires Secure File Transfers

Early this year, the United States Postal Service (USPS) announced the elimination of FTP (File Transfer Protocol) from their business practices and policies—a change that strengthens the security of their data transmissions and addresses recent audit findings. What does this mean for you? The change is still in transition for now, but after August 31, 2017, mailers and shippers will need to...
Blog

7 Steps to Protect Yourself Against Corporate Spear Phishing

Anyone with an email account is used to spam. It happens one day: you get that first unsolicited email, and then a flood of ads, flash sale offers, and foreign bank transaction requests rushes into your inbox. In that moment, the battle for your virtual sanity begins. But while spam emails are mostly harmless—you tend to see them from a mile away and respond accordingly—spear phishing emails...