Resources

Blog

Should You Use PGP or GPG Encryption?

Not every piece of information is meant for every pair of eyes. That’s why organizations count on encryption technology – to lock down their sensitive data from malicious acquisition or even human error. And, when it comes to those encryption protocols, you’ve got options. One choice you or your IT team might need to make is whether to use PGP or...
Blog

What is GPG?

What is GPG? GPG, also known as GNU Privacy Guard (GnuPG), is a different adaption, but popular implementation of the Open PGP standard as defined by RFC 4880. GPG in Depth GPG is an open-source standard and strong alternative to the official PGP software owned by Symantec. It was developed by Werner Koch and released in 1999 as an alternative...
Blog

How to Comply with Brazil's Lei Geral de Proteção de Dados (LGPD)

What is Brazil’s LGPD? LGPD stands for Lei Geral de Proteção de Dados (General Data Protection Law), which is a law streamlining what was previously 40 separate statutes protecting personal data in Brazil. Academic research and legislation around personal data and privacy has been an active priority in Brazil, culminating in the overarching idea...
Blog

How to Implement the Right Enterprise File Sharing Solution

Implementation 101 An enterprise file sharing solution is an important tool for organizations to have. The benefits are practically endless – from ensuring compliance with data regulations, to streamlining transfers with automation, to the auditing and reporting capabilities – implementing the right tool is key. However, the act of implementing...
Blog

Pair Your Enterprise File Sharing Solution with Data Loss Prevention

Is Your Enterprise File Sharing Solution Enough? Enterprise file sharing solutions are already a great way to encrypt sensitive data in motion, but encryption alone is not enough. Can you ensure that sensitive information is not accidentally transmitted? Are you able to audit who is sending what? And last, but not least, are you protecting your...
Blog

German DPAs Announce New Email Encryption Guidance

In May of 2020, substantial guidance on email encryption was issued by the German Data Protection Authorities (German DPAs) specific to personal data transferred via email. These guidelines recommend reducing the risks of a personal data breach with both end-to-end encryption and transport encryption. The new guidelines build on previous...
Blog

Is Dropbox Secure?

When it comes to file sharing software, Dropbox is often top of mind: many individuals and organizations use it to simplify their file sharing, syncing, and collaboration. But how secure is Dropbox, and is it right for your organization? To break down Dropbox security effectively, we’ll explain what Dropbox is. What is Dropbox? Dropbox was...
Blog

How to Help Ensure Compliance with Data Privacy Laws

How to Help Ensure Compliance with Data Privacy Laws If complying with data privacy laws like the GDPR, PDPA, CPA, HIPAA, PCI DSS, PIPEDA, and more sometimes feels like swimming in alphabet soup, there is a life preserver that can simplify, secure, and automate the processes involved. Managed file transfer can proactively help organizations meet...
Blog

Signs Your Business is Ready for an Enterprise File Transfer Solution

Follow the Signs If you and your enterprise are needing to regularly transfer sensitive data between users, employees, and trading partners, it’s important to follow the signs. One wrong move, such as the lack of file encryption for transfers, can hit your organization with huge fines for non-compliance. It’s important to avoid these instances...
Blog

GDPR and Data Privacy after Brexit: What’s Next?

So, the GDPR (General Data Protection Regulation) hit us with a bang in May 2018 and aside from a few high-profile fines, companies seem to be coping well on the whole. But is that really what’s happening or is it like an elegant swan, calm above water but flapping around underneath? It is safe to say that by now companies and employees are very...
Blog

Top 3 Things to Look for in a Remote Collaboration Tool

Feel Like You're Working Together — Even From Apart Finding the best way to securely collaborate on and share files can be difficult in the best of times. With large swathes of people working from home for the first time, finding the solution that meets your business requirements is paramount. Content collaboration tools vary, but fulfill...
Blog

What are Data Silos?

Standing alone can be an uncomfortable feeling at any gathering. You may only hear part of a conversation; you might not mesh well with the others in the room; you could face a number of awkward silences, and even be rejected completely. Feeling like a lone wolf at a party is discomforting for sure. Having critical data siloed and...
Blog

What is EFSS?

If you’ve ever had to MacGyver a way to send out a too-large file or work with a group of people on a single document, EFSS is probably what you were looking for to make the process painless: it’s a solution that makes sharing files (of any size) and collaborating in one place easy – and secure. EFSS stands for Enterprise File Syncing and...
Blog

Benefits of a Content Collaboration Platform

Once upon a time, an organization’s valuable content lived in file drawers with neat little tabbed folders. It also lived on top of desks and on desktops. It lived in saved emails, cloud storage services, and even was embedded in texts. When it was time to share that content however, finding it, working with it, and sending it along often...
Blog

How Does the DMZ Impact Security?

Your Secret Weapon for Data Security When weapons and military forces have been removed from active duty, this is referred to as “demilitarization.” On the internet, the demilitarized zone, or the DMZ, is a similar situation. What is the DMZ? The DMZ is the neutral network that resides between the Internet and your organization’s private...
Blog

4 Benefits of On-premises Enterprise File Sync and Sharing

The value of mission-critical business documents can't be overstated — but lax or renegade employees or trading partners can put your sensitive data at risk with reckless storage or sharing practices. Luckily, knowing that your data hasn't been exposed is as easy as implementing a secure Enterprise File Sync and Share (EFSS) solution. There are...
Blog

User Sharing and Collaboration: Security Concerns, Risks, and How to Securely Collaborate

Collaboration in the Workspace Secure collaboration tools that permit the sharing of sensitive data between users are quickly gaining momentum in the world of technology and file transfer. Although there are many benefits to utilizing these tools in the workspace, with user sharing and secure collaboration comes security concerns and a variety...
Blog

8 Surprising Ways to Use GoAnywhere's Secure Folders Module

What is Secure Folders? Secure Folders is a licensed module GoAnywhere MFT offers its users. It provides access to authorized files and folders on the server or network location through a HTTPS Web Client. However, it can do so much more with its array of features. Read on to learn 8 surprising ways to use GoAnywhere’s Secure Folders module....
Blog

PDPA in Singapore Helps Protect Personal Data

What is the PDPA of 2012? The Personal Data Protection Act of 2012 (PDPA) is a law designed to regulate and enforce the proper collection, use, disclosure, and care of the personal data of citizens in the Republic of Singapore. The Personal Data Protection Commission (PDPC) is charged with establishing policies and for reviewing organizational...
Blog

Should You Use a File Sharing App?

Should You Use a File Sharing App? File sharing apps like Dropbox and Google Drive certainly have their appeal. They are user-friendly, often free, and do the job of getting information from one user to another. Until they don’t. Or, until your files are hacked, get into the wrong hands, live in infamy, have unrestricted access, or are...