Resources

Blog

OpenPGP, PGP, and GPG: What is the Difference?

The privacy capabilities of encryption methods such as Pretty Good Privacy (PGP) allow organizations to achieve a hightened amount of data security and protection. There are various approaches and elements of comparison for these encryption methods, however, and each one comes with their own histories, features, and capabilities. These are: PGP,...
Press Release

Free Open PGP Encryption Tool Now Available

Omaha, Neb - March 25, 2013 Linoma Software [now Fortra] is pleased to announce the release of a free encryption tool for the desktop that uses the popular Open PGP standard. This unrestricted freeware, named GoAnywhere Open PGP Studio, can encrypt sensitive documents on a variety of operating systems including Windows, Linux and Mac OS X....
Blog

How to Build a Framework for HIPAA and HITECH Compliance

HIPAA, established in 1996, was signed into law to outline the appropriate ways to use and disclose patient health information. Read on to learn how to develop a HIPAA- and HITECH-compliant IT framework for your organization. Why Does HITECH Exist? HITECH laws were enacted to up the ante on healthcare organizations to meet HIPAA legal...
Blog

Addressing HIPAA and HITECH Compliance Challenges

HIPAA and HITECH regulations were designed and enacted to increase the security surrounding personal health information from those who should not have access to it. Next to finance, the healthcare industry is one of the most regulated industries around. While debates on the cost, structure, and delivery of healthcare continues, most people agree...
Blog

Driving Securely Through the Cloud

Cloud computing is not for everything and not for everyone, but it has made a permanent mark in the lexicon of technology services. And there is a lot of hype around cloud computing and what it can do for organizations. To be fair, it is a very powerful tool. But it’s important to work out how you can use it most effectively and securely. The...
Blog

Meeting Compliance Regulations and Privacy Laws for Sensitive Data Transfers

Comply with Data Security Requirements Highly sensitive data is exchanged between organizations on a constant basis making data security compliance more vital than ever to keep communication flowing. For instance, if a business routinely transmits financial information to their bank including payroll direct deposits and ACH payments, these...