Blog

Blog

Top 12 File Transfer Frustrations

Sending and exchanging files is a vital daily task in most organizations. However, this responsibility to exchange information comes with some pretty common frustrations and risks unless the file transfer process is secure and managed appropriately. Here are a few of the biggest frustrations in file transfers and some solutions to help alleviate them...
Blog

5 Topics You Should Know About in the World of Cybersecurity

Every year, organizations work hard to protect their data and analyze potential risks to it. However, as we’ve seen recently, the number of cybersecurity risks and data breaches has risen sharply. This makes it even more important to keep up with the newest cybersecurity guidelines and news so you can prepare your organization in the most effective...
Blog

7 Signs You're Making the Most of GoAnywhere

The measure of any tool is how effectively you’re using it. If you’ve already mastered the steps to get started with GoAnywhere, check out these features, projects, and automations to discover whether you’re making the most of your GoAnywhere setup. 1. You’ve Set up Secure Forms for Information Intake Standardize information delivery for your...
Blog

How to Meet Biden’s Executive Order on Cybersecurity Requirements

On May 12, 2021, President Biden issued an executive order designed to improve the nation’s cybersecurity and to better protect federal government networks. The Executive Order on Improving the Nation’s Cybersecurity calls for stronger and more layered data security as part of a focus on data-centric security architecture centered around the...
Blog

The Top 10 Healthcare Data Breaches of 2020

2020 Was the Worst – in Healthcare Data BreachesData breaches can have catastrophic consequences on those who are unfortunate enough to suffer from one. From steep costs and/or fines (in the millions) to a ruined reputation, data breaches are not to be taken lightly. This is especially true for the healthcare industry, where sensitive patient data, or...
Blog

Improve Your Big Data File Transfers: 11 Security Features to Consider

New challenges and new opportunities have arisen due to big data, which is altering the nature of file transfer technology.The Good NewsBig data is leading to new file sharing technology, which is making it easier to solve certain big data file transfer problems. On the other hand, it is increasing the bandwidth requirements companies face, including...
Blog

What is Enterprise SFTP Software?

What is Enterprise SFTP Software? The primary job of all SFTP software is to move files over a secure shell (SSH) connection. SFTP software can exist as a standalone tool, or as part of a larger software solution, such as managed file transfer (MFT). SFTP software can be made up of a client, a server, or both together. What distinguishes...
Blog

TFTP vs. FTP: What is the Difference?

Transferring files over the internet is a common task in today’s digital world and it’s important to select a protocol that fits your organization’s needs.A protocol is a set of rules and messages between a sender and a receiver. It functions much like a language that both ends of the network understand so the data arrives uncorrupted and with a proper file name. When choosing a protocol, there...
Blog

Canadian Data Privacy Laws: An Overview

Awareness and protections around how data containing private information is handled is ramping up across the globe, and Canada is no exception. Current data privacy laws in Canada include measures to protect individual privacy rights, transparency, access, and security. These laws are designed to give the public more control over how their...
Blog

8 Reasons to Implement an MFT Security Solution

Today’s businesses need to adhere to various security standards (e.g., PCI DSS, HIPAA, the GDPR) not only to prevent the high costs associated with data breaches, but also to avoid hefty penalties.Due to the large amount of data that organizations need to handle and protect, ensuring the security of data transferred among employees, partners, vendors,...
Blog

What is Drummond Certification?

Drummond Certification: What is it? The Drummond Group is a third-party certification body that certifies software products and solutions to ensure a given solution does what it says it will. A security solution that goes through their extensive certification process earns the right to add the Drummond-certified distinction to its product...
Blog

PGP vs. Open PGP: What’s the Difference?

Encryption standards become more and more important every day. With the rise of data breaches, it’s critical now more than ever for organizations to raise the level at which they protect their information. Partly, educating employees has presented itself as an easy way to make data safer. However, taking the time to choose the right method of...
Blog

What is the Canadian Communication Security Establishment?

What is the CSE? The CSE is one of Canada’s key security and intelligence organizations, specializing in cryptology. CSE stands for Communications Security Establishment or Centre de la sécurité des télécommunications. As a cybersecurity leader in Canada, it has three main duties: Collecting foreign signals intelligence, aka intercepting...
Blog

What Does Integration Buy You?

What Can Data Integration Buy You?Data integration is the practice of consolidating data from a number of sources into a single, unified, and consistent source.This way of configuring data does an excellent job of meeting the needs of business processes and is a key component of any thriving data security structure.Make the data integration process...
Blog

Data Security Best Practices Every CISO Should Know

Aligning Data Security with Organizational Strategy The responsibility for an organization’s information and data security is a hefty one, knowing each day that it’s not a matter of whether a cybersecurity attack will happen, but rather when it will happen on your watch. Whether data is grabbed in a headline-making breach of a well-known entity,...
Blog

How MFT Fits into Your Data Security Suite

By now, you’ve probably figured out that no singular data security product can be fully responsible for all critical data security measures. Instead, consider each element of your data security environment as a key ingredient in a well-rounded recipe for protecting the digital information so critical to your organization’s well-being.What Should be in...
Blog

How to Use MFT as a Workflow Automation Tool in Healthcare

When it comes to managed file transfer (MFT) solutions, organizations across industries find them valuable for policy enforcement, user access control and authorization, risk reduction, and more. And when it comes to HIPAA and HITECH requirements, MFT shines as a secure workflow automation tool. MFT as a B2B Enabler What makes MFT a perfect...
Blog

Consolidate Your File Transfers with GoAnywhere MFT

Consolidation is the Stepping Stone to Successful File TransfersWhen you’re utilizing a managed file transfer (MFT) solution, consolidation is an impactful mechanism that helps you to make the most out of your file transfers.With GoAnywhere MFT, you can successfully bring together multiple different technologies and platforms all under one solution....
Blog

The 2021 MFT Data Quadrant Report is Here

The 2021 MFT Data Quadrant Report is Here Another year has come and gone, and with another year brings a new Info-Tech Managed File Transfer (MFT) Data Quadrant Report. We’re pretty excited with our ranking this year (hint: #1) and we wanted to share the news, plus highlight some of the areas we excelled in. The Overall Composite Score + NET...
Blog

The Difference Between Implicit and Explicit FTPS

As you search for a file transfer protocol that works to meet your organization’s needs, you may have stumbled across FTPS.What is FTPS?FTPS is FTP over SSL which allows you to connect with your trading partners and customers securely. FTPS supports security methods such as passwords, client certificates, and server certificates.FTPS and its...