Blog
PCI DSS 4.0 - What to Expect, What's Coming, How to Comply
By Heath Kath on Tue, 08/30/2022
Get ready for more stringent PCI DSS compliance requirements. The PCI Security Standards Council (PCI SSC) updated its version 4.0 requirements in March 2022, in large part to address increasingly sophisticated cybercriminal threats. Rapidly growing contactless and cloud-based card usage also helped nudge an update to PCI DSS requirements, which...
Case Study
AnMed Health Improves File Transfer Stability and Enjoys Significant Cost Savings Thanks to MFT
Industry: Healthcare
As legacy FTP processes start to degrade, they slowly consume more and more IT resources. Most companies don't recognize the true enormity of the problem until it comes to a head.
AnMed Health (Anderson Area Medical Center) recognized the inefficiency and risk of their file transfer operations and set out to find a replacement: GoAnywhere MFT.
Reducing Staffing Resources...
Case Study
Meliá Hotels International Gains File Transfer Stability and Confidence with GoAnywhere MFT
Adding GoAnywhere MFT to their IT environment for secure file transfers was the remedy Melia needed. GoAnywhere allowed Meliá Hotels International to integrate these third-party exchanges into the same tool as the rest of their transfers, without making any protocol changes, and with added security through its built-in SFTP and Secure Forms capabilities.
Case Study
Monterey Mushrooms
For Monterey Mushrooms, the e-mail notifications, the ability to automate projects, and the seamless version updates are just a few of Barabara Bularzik's favorite features with GoAnywhere.
...
Blog
Security Risks of File Transfers and How to Reduce Them
By Heath Kath on Tue, 08/23/2022
Transferring files between customers and trading partners, especially files containing sensitive data without appropriate data security protection solutions applied, involves at least some level of risk. You might accidentally send files to the wrong recipient. Or your latest email attachment was sent with an unsecure File Transfer Protocol (FTP)...
Blog
How to Secure Your Data Exchanges
By Heath Kath on Mon, 08/15/2022
Exchanging Data Securely Requires Stepped Up Data Transfer Methods
Exchanging data is easy, right? Just grab a file, attach it, and hit “send.” Then sit back and relax. Not so fast! If you want to securely exchange data and protect any sensitive data your files may contain, you need to send them with a secure file transfer solution that...
Blog
What Do Emerging Data Privacy Laws in the U.S. Mean for You?
By Heath Kath on Tue, 07/26/2022
What is Data Privacy?
One can think of data privacy as all the processes involved in how confidential or personal information or data is collected, used, and shared or governed. No singular policy governs data privacy, with requirements and penalties varying across states and countries. Data privacy laws are legal constructs that set clear lines...
Blog
Largest Data Breaches in Last 10 Years
By Heath Kath on Tue, 07/19/2022
Bigger is often better. A bigger slice of pizza or a bigger paycheck sounds pretty nice. An extra-large data breach, not so much.
Listing out the biggest data breaches of all time can be challenging, as the next big one could be right around the corner. At the time of this writing, reports are out that the Personally Identifiable Information ...
Blog
Lessons Learned from the REvil Ransomware Attack of 2021
By Scott Messick on Tue, 07/12/2022
Fireworks lighting up the sky, the smell of backyard grills cranking out delicious food, and organizations reeling from massive global cyberattacks. Aaah….those not-so-sweet memories of that first weekend in July 2021, when hundreds of businesses were smacked with the financial, logistical, and reputational ramifications of ransomware attacks.
...
Blog
This Month in Cybersecurity: Summer is Here, but There’s No Vacation From Cyberattacks
By Heath Kath on Thu, 07/07/2022
June generally marks the start of summer, although anyone thinking the cyber criminals will take a few months off should probably think again. Not only has one of most sacred of summer institutions – Wimbledon – been subject to a threat, but fresh attacks and threats emerged all over the world.
It’s clear that organizations must remain vigilant...
Blog
What is the Smominru Botnet?
Thu, 06/30/2022
What is the Smominru Botnet?
Though its origins date back to 2017, Smominru is a dangerous botnet that has been making headlines recently as it continues to spread, attacking targets in every industry. Smominru, which also operates under known variants like including Hexmen and Mykings, has infiltrated hundreds of thousands of machines,...
Blog
End-to-End Rights Management Made Simple with SFT
By Chris Spargen on Tue, 06/07/2022
Digital files are the crown jewels of any organization, and end-to-end rights management is increasingly the goal of businesses who need to transfer files securely. How can organizations ensure data is secure from inception to publication, especially when third parties enter the picture?
Enter secure file transfer plus digital rights management....
Blog
Is Your Disaster Recovery Site Ready?
By Heath Kath on Wed, 05/04/2022
The old adage, "It's not a matter of if, but when" can strike fear in the heart of every IT professional, especially when talking about recovering form the unexpected impact of outages. Whether the result of a natural disaster, cybercrime impact, or large-scale network outages that dreaded downtime and the security measures that need to be taken...
Blog
How GoAnywhere MFT Works with SharePoint
By Chris Spargen on Thu, 04/28/2022
Data and documents are the lifeblood of the business and sharing that data to both external trading partners and internal stakeholders is essential. Discover how GoAnywhere works with one of today’s favorite intranet sites for teams and file sharing: SharePoint.
What is SharePoint?
SharePoint helps teams meet various business needs by providing...
Blog
How to Streamline Secure Data Exchanges
By Heath Kath on Tue, 04/26/2022
Secure Data Exchanges Don't Have to Sacrifice Efficiency
Hitting “send” is as routine and frequent as sipping on coffee for many employees. And uploading a file to a third-party, vendor, or another colleague happens with that same automatic mind-set. Outside of the IT team, many employees don’t actually give a lot of thought to the journey of...
Blog
Comparing the Top File Transfer Protocols
By Heath Kath on Tue, 04/19/2022
With dozens of file transfer protocols to choose from, how do you know which is the best for your business?
Some file transfer protocol specifications are set by trading partners – method, format, and security requirements – while others are set by internal requirements. Discover the top secure file transfer methods, and how they stack up...
Blog
Choosing MFT Software Based on User Reviews
By Brian Pick on Thu, 04/07/2022
Humans use reviews for pretty much everything – hiring a company, making a purchase, even applying for a job. Reviews give us insight into what someone – presumably someone like us, if they’re currently using the same thing we’re shopping for – thinks of a product: how they liked it, what their experience is, and what could have been better. Even...