Resources

Blog

Top Takeaways from the 2017 Cybersecurity Trend Report

Note from the Editor: This article shares highlights from an older report. For the latest on data security and best practices for keeping file transfers safe, visit our Data Security page or check out the latest additions to our blog.Do you ever wish you knew how other businesses are dealing with today’s security threats? The 2017 Cybersecurity...
Blog

The State of File Transfer Security

Note from the Editor: This article shares highlights from an older report. For the latest on data security and best practices for keeping file transfers safe, visit our Data Security page or check out the latest additions to our blog. The 2017 Cybersecurity Trends Report was recently released by Crowd Research Partners. The report covers many aspects of cybersecurity, such as general...
Blog

Still Using SHA-1 to Secure File Transfers? It’s Time to Say Goodbye

Securing information is rising in importance for organizations worldwide. Using outdated technology is extremely risky, yet many organizations continue to do so because of legacy systems that don’t allow them to upgrade, lack of resources and time to upgrade, or they are simply unaware of the risks. The commonly used SHA-1 algorithm is a perfect...
Blog

3 Steps to Safeguarding Company Data and Limiting Risk

Security professionals of today are inundated with headlines about the potential consequences of a data breach. Making headlines for a data breach can cost you – and more than just reparations or a fine. Data breaches are the worst of bad press and can impact your finances for years to come. As security professionals work to manage...
Blog

SHA-2 and TLS Security for AS2 Transfers

SHA-2 and TLS Security for AS2 Transfers It’s crucial for organizations to take the time to upgrade the security used to protect their AS2 data transfers. In order to be compliant with the latest security standards, you need to be using a modern AS2 solution. Related Reading: AS2 Protocol Software for Client & Server Transfers The Story...
Blog

What is AS2? Common Protocol Explained

For those that ask "What is AS2?," AS2 is an abbreviation for Applicability Statement 2, which is a popular file transfer protocol that allows businesses to exchange data with their trading partners. AS2 protocol combines the use of several secure and widely used technologies including HTTPS, SSL Certificates, S/MIME, and file hashing. By...
Blog

OpenPGP, PGP, and GPG: What is the Difference?

The privacy capabilities of encryption methods such as Pretty Good Privacy (PGP) allow organizations to achieve a hightened amount of data security and protection. There are various approaches and elements of comparison for these encryption methods, however, and each one comes with their own histories, features, and capabilities. These are: PGP,...
Blog

Keeping File Transfers Secure from Hackers and Cyber Threats

Keep Your Files Secure In the battle to secure information, it helps to know a little bit about how it can be compromised. Using FTP is one way to expose critical vulnerabilities and can allow credentials to be hacked. However, these holes in security can also be easily closed if you know how. How Hackers Discover Vulnerabilities Here's how...
Blog

How to Solve 4 Common Email Security Challenges

Yes. Emailing someone is still one of the easiest ways to share data. However, there are some important caveats to sharing files this way that can put your organization’s file transfers at risk. Email File Transfer Challenges These are the four big challenges that organizations should be aware of when transmitting files via email. Email is...
Blog

FIPS 140-2 Plays Vital Government Business Role

What is FIPS 140-2? FIPS 140-2 is a standard with which cryptographic-based (encryption) security systems must comply when protecting sensitive data in U.S. government agencies and departments. This FIPS 140-2 standard also extends to other entities that may exchange sensitive data with the federal government, including defense contractors,...
Press Release

Outlook 2010 Plugin Now Available for GoAnywhere Secure Mail

Omaha, Neb - August 1, 2012 Download PDF Organizations whose employees have been using email to send confidential files have realized the dangers that unsecure email can pose. That's why Linoma Software added a Secure Mail module to its popular secure FTP server, GoAnywhere Services, part of the GoAnywhere Managed File Transfer (MFT) software suite. Released in February, 2012, the Secure Mail...
Blog

Are Insurance Companies Managing Their Risk of Data Breach?

Insurance companies are the experts at analyzing and managing risk. They identify, quantify, and set pricing based on the calculated costs of risk. Naturally, the higher the perceived risk, the higher the cost to mitigate the potential losses. Yet, here is the irony. While those in the insurance industry excel at evaluating risk...
Blog

Is Your Company Letting Data Slip Through the Cracks?

Many Americans have spent the last few days frantically searching for receipts and other documentation to finish their taxes before April 15th — only to realize they get a one-month reprieve this year. Despite that sigh of relief, there's no doubt that some of those people thought they knew exactly where to find what they needed, and were...
Blog

Are You Next in Line for a Data Breach?

A Data Breach is Closer Than You Think As the percentage of data breaches increase, the risk of organizations losing your sensitive data also increases. No one wants to receive the news that some or all of their personally identifiable information (PII) was stolen. Sure, there are people who are victims of various phishing scams, but it's more...
Blog

The Culture of Data Security

Here at Fortra, we hear a lot of buzz about protecting both customer and company data, but it's alarming how many IT departments and enterprise users are still not protecting their data correctly. According to the Ponemon Institute, fewer than 50 percent of organizations have comprehensive encryption protection in place. Prevention vs....