Resources

Blog

Why Healthcare Organizations Need a Secure Data Transfer Solution

The last few years were scary in terms of healthcare cybersecurity. A hack of Banner Health breached up to 3.7 million records. Another data breach at 21st Century Oncology resulted in multiple lawsuits being filed against the organization. When a third party gained unauthorized access to computer systems at Valley Anesthesiology and Pain Consultants, almost 900 thousand patients, employees, and...
Blog

10 Shocking PCI DSS Compliance Statistics

If you work for any organization that processes credit or debit card information, you’ve heard of the Payment Card Industry Data Security Standard (PCI DSS), the regulatory standard aimed at preventing costly data breaches like the ones you may have heard about at Home Depot or TJX. But how much do you really know about PCI DSS compliance? Here are some interesting PCI DSS compliance statistics...
Blog

3 Data Breaches That May Have Been Avoided through PCI DSS Compliance

"Dear Valued Customer,As you may have heard, on September 8, 2014, we confirmed that our payment data systems have been breached, which could potentially impact customers using payment cards at our U.S. and Canadian stores." This is an excerpt from an actual email distributed by a large retailer, in the wake of a massive data breach jeopardizing over...
Article

New Version of GoAnywhere Managed File Transfer Improves Application Integration and API Support

See Updated Release NotesLinoma Software [now Fortra] has extended GoAnywhere Managed File Transfer’s workflow automation and file transfer features to include SOAP and RESTful Web Services. Combined with new JSON Read & Write tasks, GoAnywhere MFT 5.4 provides better integration with Web Services and other applications for securely transferring data and automating processes.“Organizations are...
Blog

No Such Thing as a Free File Transfer, Part 3: Are Your File Transfers Holding Back Business Growth?

One of the most common reasons businesses have for not optimizing processes or implementing modern software solutions is simply that “we’ve always done it this way.” We get it—sure, your file transfer process is a little time-consuming and your FTP tool doesn’t have the most up-to-date security features, but your business is doing fine. Why spend...
Blog

No Such Thing as a Free File Transfer, Part 2: Cost-effective Security

With new corporate data breaches in the news seemingly every day, it’s no surprise that security is a top concern for IT professionals. However, file transfers are an area where many companies are still vulnerable.Most file transfers still use FTP, a protocol that comes with inherent risks. Other common file transfer solutions, like file sharing...
Blog

No Such Thing as a Free File Transfer, Part I: How MFT Saves Time

Every business engages in some kind of information exchange, whether it’s a small retailer attaching an invoice to an email or a hospital sending hundreds of patient records between departments. Some methods of exchanging files, like a basic FTP server or a file sharing app, seem like an inexpensive way to deal with your transfers. In the...
Blog

The Benefits of File Transfer Automation

Organizations today are challenged with maximizing their resources in a fiercely competitive environment. Benjamin Franklin famously said, “Lost time is never found again.” This is a problem that IT departments of all sizes have become familiar with. Take, for example, an IT staff member who spends countless hours waiting on inbound and...
Blog

SHA-2 and TLS Security for AS2 Transfers

SHA-2 and TLS Security for AS2 Transfers It’s crucial for organizations to take the time to upgrade the security used to protect their AS2 data transfers. In order to be compliant with the latest security standards, you need to be using a modern AS2 solution. Related Reading: AS2 Protocol Software for Client & Server Transfers The Story...
Blog

What is AS2? Common Protocol Explained

For those that ask "What is AS2?," AS2 is an abbreviation for Applicability Statement 2, which is a popular file transfer protocol that allows businesses to exchange data with their trading partners.AS2 protocol combines the use of several secure and widely used technologies including HTTPS, SSL Certificates, S/MIME, and file hashing. By utilizing...
Blog

Managed File Transfer 101: What's in it for Me?

Note from the Editor: This blog is a recap of an older webinar. To view the most recent webinars, you can do so here.Meet MFTThe term MFT (Managed File Transfer) is not new, but you may have begun to hear it more frequently. Changes in data security and transmission regulations have brought this established technology to the forefront, but what...
Blog

Keeping File Transfers Secure from Hackers and Cyber Threats

Keep Your Files Secure In the battle to secure information, it helps to know a little bit about how it can be compromised. Using FTP is one way to expose critical vulnerabilities and can allow credentials to be hacked. However, these holes in security can also be easily closed if you know how. How Hackers Discover Vulnerabilities Here's how...
Blog

How to Solve 4 Common Email Security Challenges

Yes. Emailing someone is still one of the easiest ways to share data. However, there are some important caveats to sharing files this way that can put your organization’s file transfers at risk.Email File Transfer ChallengesThese are the four big challenges that organizations should be aware of when transmitting files via email.Email is sent "in the...
Blog

Are Insurance Companies Managing Their Risk of Data Breach?

Insurance companies are the experts at analyzing and managing risk. They identify, quantify, and set pricing based on the calculated costs of risk. Naturally, the higher the perceived risk, the higher the cost to mitigate the potential losses.Yet, here is the irony. While those in the insurance industry excel at evaluating risk management for their...
Blog

Is Your Company Letting Data Slip Through the Cracks?

Many Americans have spent the last few days frantically searching for receipts and other documentation to finish their taxes before April 15th — only to realize they get a one-month reprieve this year.Despite that sigh of relief, there's no doubt that some of those people thought they knew exactly where to find what they needed, and were dismayed to...
Blog

How Important is Auditing Your File Transfers?

When you send someone a file using FTP, how do you know (and later prove) that it was successfully sent? Consider the Complexities It might be possible to save a screenshot as long as the process was simple and you can see all the commands on a single screen. But what if your commands start getting complex? And if you start sending quite a few...
Blog

Reverse Proxy DMZ Secure Gateways Might Be the Missing Link in Your MFT Strategy

By now, most companies have gotten the message that their data—as well as the sensitive data belonging to customers and partners—needs reliable protection from unauthorized access. The ever growing regulatory environment is making it more and more painful for any company who does not take their data security seriously.The challenges of data...
Blog

What Makes FTP an Outdated Security Method

Why is FTP an Outdated Protocol?FTP was designed as an easy mechanism for exchanging files between computers at a time when networks were new and information security was an immature science. In the 1970s, if you wanted to secure a server from unwanted access, you simply locked the computer room door. User access to data was controlled by the basic...