Resources

Blog

What is Safer Internet Day?

Safety First: It’s Safer Internet Day! Each February, more than 100 countries around the world take note of the massive power of the internet and more importantly, the urgency surrounding how to be safer and better users of the internet, especially those younger users. In the U.S., Safer Internet Day is recognized on Feb. 9. Why Was Safer...
Blog

What is FISMA?

What is FISMA and How Does it Work? The Federal Information Security Management Act (FISMA) is a 2002 United States law that outlines steps and guidelines to follow to reduce security risks to federal data. FISMA applies to all U.S. federal agencies, some state agencies, and any private sector organizations that have a contract with the U.S. government. Additionally, both the National...
Blog

What is SSL, TLS, and HTTPS?

Meet the Trio SSL, TLS, and HTTPS are a unique trio that each work to help keep your important data secure on the Internet. If you've ever wondered how each of these protocols compares, you’ve come to the right place. Here are the basics and how they operate. Know the Terms: GoAnywhere Glossary What is SSL? SSL, short for Secure...
Blog

Top Data Breaches of 2020: How You Can Minimize Your Risks

Despite the many changes that 2020 brought, including new home offices, new (and quickly abandoned) hobbies, and new threats, some things stayed the same: numerous data breaches, disruptive hacks, and staggering fines. We thought 2019 was a momentous year for data breaches, and it even earned the name “the worst year on record” before the end of...
Press Release

Fortra Acquires FileCatalyst to Continue Expansion of Cybersecurity and Automation Portfolio

MINNEAPOLIS (January 4, 2021)—Fortra announced today the acquisition of FileCatalyst, a leader in enterprise file transfer acceleration. FileCatalyst enables organizations working with extremely large files to optimize and transfer their information swiftly and securely across global networks. This can be particularly beneficial in industries such as broadcast media and live sports. With the...
Blog

The Top 7 Cybersecurity Strategies for Your Business in 2021

Did you know that the average cost of a data breach is $3.92 million and almost 30% of all organizations will experience at least one breach over the next 24 months? Besides the immediate cost, such as data loss and regulatory fines, organizations also suffer from tarnished reputations, eroded customer trust, the cost of other remedial measures,...
Blog

What is Cryptojacking?

Cryptocurrency and Cryptojacking Make a Dangerous Pair With the rise in popularity of cryptocurrencies (electronic money) and their increasing acceptance as a legitimate way to purchase goods and services online, it didn’t take long for cryptojackers or cryptohackers to begin devising their schemes to mine cryptocurrency from others; and...
Blog

Give the Gift of Secure Folders, Secure Forms, and More

If you’ve already given your IT team and organization the gift of managed file transfer (MFT) for secure, streamlined file transfers of your business-critical information, wow them further with modules. GoAnywhere modules, such as Secure Forms and Secure Folders, are like the bows on top of a present – they help tie up the loose ends of your...
Blog

The State of Financial Services Cybersecurity

From Robin Hood to Bonnie and Clyde to Equifax, banks and the finance industry have been in jeopardy since the beginning of recorded history. For one, banks and financial services are enticing targets. The promise of a big payout, whether by breaching the vault or ransoming sensitive personal data, is what keeps would-be bank robbers and cyber...
Blog

What is Computer Security Day?

News Flash: It’s Computer Security Day! Today, November 30, is Computer Security Day! These days, electronic devices like smartphones, tablets, and computers are a huge part of our everyday lives. They impact how we socialize, how we work, how we get around, and so much more. Although communication has become easier, efficient, and more...
Blog

The Ultimate Checklist for Purchasing File Encryption Software

Every organization needs to safeguard the data they collect, store, and share with customers, trading partners, and colleagues. Many choose file encryption software, which is one of the most straightforward ways to protect your data at rest and in motion. By using one of several complex algorithms, file encryption software encodes the contents...
Blog

19 Ways to Transfer Big Files

You have choices when it comes to sending large files. You can choose to take your chances with free file transfer solutions, but they can be risky. Using a managed file transfer (MFT) solution is a reliable way to secure your data and ensure it gets where it needs to be. Here’s a few ways you can get peace-of-mind when sending your big files. ...
Blog

What is File Encryption Software?

File encryption software is a tool – either free or paid – that encodes your information so that it remains secure in motion, at rest, or both. Securing sensitive data is essential for any organization, and file encryption software does the heavy lifting. File encryption software uses one of several complex algorithms to scramble the contents of...
Blog

The Cybersecurity Dangers of the Dark Web and How to Protect Your Organization

Even as cybersecurity experts and researchers declare that the “underground golden age is over” as its top marketplaces are raided or close their doors, the dark web continues to thrive. In fact, Darkode, one of the most well-known hacking forums and black markets, recently reopened. And what are some of the most common wares at these underground...
Blog

Why You Should Use Scheduled File Transfer Software

Have you set up Amazon auto-deliveries? Installed a smart thermostat to keep your house the perfect temperature throughout the day? Approved auto-pay for your bills? Today’s world makes it easy to simplify nearly every aspect of your day-to-day – so why not schedule your file transfers? What is Scheduled File Transfer Software? More commonly...
Blog

35 Cybersecurity Jokes to Make Any Security Geek Chuckle (or Groan)

Good IT jokes are few and far between, especially when it comes to cybersecurity. That’s why we put on our creativity hats to brainstorm joke after joke – with a break to pull in a few of our favorites from the web – for the ultimate result: the motherlode (or should we say motherboard?) of cybersecurity jokes and puns. P.S.: we side with Alfred...
Blog

Why You Should Use File Encryption Software

File Encryption Software is “Key” What is the key to keeping your data safe? One word: Encryption. There’s no question that encrypting sensitive data at rest and in motion is essential when it comes to guarding against cyber threats and complying with local, national, or industry-standard requirements. However, if you’re still on the...
Blog

German DPAs Announce New Email Encryption Guidance

In May of 2020, substantial guidance on email encryption was issued by the German Data Protection Authorities (German DPAs) specific to personal data transferred via email. These guidelines recommend reducing the risks of a personal data breach with both end-to-end encryption and transport encryption. The new guidelines build on previous...
Blog

3 Lessons Learned from a Data Breach

Data breaches have been plaguing organizations for years and the numbers continue to climb. After a breach, an organization goes into survival mode — trying to recover data, reestablish trust, and ensure they can keep their business running. It’s understandable that there isn’t much leisure time to sit back and reflect on what could have been...
Blog

5 Ways to Tighten Cybersecurity Working from Home

Logistically, you’re good to go: employees are working from their home offices, spare rooms, and kitchen counters as if they’ve always been doing it, IT is keeping things chugging along on the back end, and you’ve even ironed out the kinks in video call happy hours. Now that your employees can successfully work from home, it’s time to circle back...