Guide
How to Comply with PCI Data Security Standards
If you work for any organization that processes credit or debit cards, then you must achieve and maintain PCI DSS compliance. The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that process credit or debit cards. The standard is a moving target as it is frequently updated to address new security threats or to clarify issues...
Guide
PCI DSS Compliance with Managed File Transfer
Leading edge IT shops are rethinking the use of underlying components within their data transfer arsenals, and are arming themselves to comply with ever changing compliance requirements, including PCI DSS.
Download the white paper to examine how a Managed File Transfer (MFT) solution can help your company stay ahead of PCI compliance requirements with data transfers. This PCI Compliance white...
Blog
What Do Emerging Data Privacy Laws in the U.S. Mean for You?
By Heath Kath on Tue, 07/26/2022
What is Data Privacy?
One can think of data privacy as all the processes involved in how confidential or personal information or data is collected, used, and shared or governed. No singular policy governs data privacy, with requirements and penalties varying across states and countries. Data privacy laws are legal constructs that set clear lines...
Blog
Secure File Transfer Drives Compliance and Efficiency for Credit Unions
By Chris Spargen on Fri, 05/13/2022
The unwavering protection of personally identifiable information (PII) is the foundation upon which financial and banking organizations build their services and instill trust in customers. Achieving this requires credit unions and related companies to navigate a fine balance between stringent data security and business efficiency to meet customer...
Press Release
Fortra to Acquire Alert Logic to Enable Customers to Address Cybersecurity Skills Shortage with Hybrid IT Approach
MINNEAPOLIS March 9, 2022—Fortra announced today it has signed a merger agreement to acquire Alert Logic, a well-known leader in managed detection and response (MDR) services. Alert Logic works as a seamless extension of security teams, augmenting existing cybersecurity resources and technology to safeguard on-premise, cloud, SaaS, and hybrid infrastructures. The company’s MDR solution focuses on...
Blog
What is PGP Encryption and How to Use It
By Chris Spargen on Tue, 08/03/2021
Encryption is key to securing organizational data in the short term and long. However, there are a few different types of encryption that organizations can use to achieve the optimal level of security. GnuPG is one of the most notable. However, today we’ll break down how PGP encryption works and how to use it to maintain the safety of your files....
Blog
What is PGP and How Does It Work?
By Brian Pick on Fri, 07/09/2021
When someone in your organization wants to transfer a file – internally or outside of the organization – a few concerns may come up:
Is the file complete?
Is it being sent to the right place?
Will it arrive intact?
Is sensitive data protected and encrypted from unauthorized recipients?
All are valid concerns, and each can be addressed...
Blog
PGP vs. Open PGP: What’s the Difference?
By Chris Spargen on Tue, 05/04/2021
Encryption standards become more and more important every day. With the rise of data breaches, it’s critical now more than ever for organizations to raise the level at which they protect their information. Partly, educating employees has presented itself as an easy way to make data safer. However, taking the time to choose the right method of...
Blog
Should You Use PGP or GPG Encryption?
By Heath Kath on Thu, 04/01/2021
Not every piece of information is meant for every pair of eyes. That’s why organizations count on encryption technology – to lock down their sensitive data from malicious acquisition or even human error. And, when it comes to those encryption protocols, you’ve got options. One choice you or your IT team might need to make is whether to use PGP or...
Blog
Avoid a PCI Breach; Avoid Costly Consequences
By Heath Kath on Thu, 03/18/2021
Trending and making news headlines can be great for business, but not if the reason you’re making news is because of a PCI breach. Any organization that processes credit or debit card information is vulnerable, but any organization can also take steps to minimize their risks and the costly mitigation efforts that follow a breach.
The Payment...
Blog
What is GPG?
By Heath Kath on Tue, 02/23/2021
What is GPG?
GPG, also known as GNU Privacy Guard (GnuPG), is a different adaption, but popular implementation of the Open PGP standard as defined by RFC 4880.
GPG in Depth
GPG is an open-source standard and strong alternative to the official PGP software owned by Symantec. It was developed by Werner Koch and released in 1999 as an alternative...
Blog
What is FISMA?
By Heath Kath on Thu, 02/04/2021
What is FISMA and How Does it Work?
The Federal Information Security Management Act (FISMA) is a 2002 United States law that outlines steps and guidelines to follow to reduce security risks to federal data. FISMA applies to all U.S. federal agencies, some state agencies, and any private sector organizations that have a contract with the U.S. government. Additionally, both the National...
Blog
The 5 Biggest PCI Compliance Breaches
By Heath Kath on Tue, 01/26/2021
The Payment Card Industry Data Security Standard (PCI DSS) is the main information security standard for organizations that process credit or debit card information must abide by. The guidelines established in PCI DSS cover how to secure data handling processes.
While most organizations work to avoid PCI compliance breaches through the...
Blog
PCI Statistics That May Shock You
By Heath Kath on Tue, 01/19/2021
If your organization processes credit or debit card information, you’re probably already familiar with the Payment Card Industry Data Security Standard (PCI DSS), the regulatory standard enacted to prevent large data breaches like the ones you hear about frequently – the ones that make headlines for all the wrong reasons.
Here are a few...
Blog
8 Real Ways Financial Organizations Use GoAnywhere MFT
By Chris Spargen on Tue, 08/04/2020
GoAnywhere MFT is the Ultimate Asset for Banking and Finance
For banking and financial organizations, protecting sensitive customer data and meeting compliance requirements for regulations is critical.
From controlling the exchange of sensitive cardholder data, to tracking file movements for easy auditing, GoAnywhere Managed File Transfer (MFT)...
Blog
How to Help Ensure Compliance with Data Privacy Laws
By Heath Kath on Tue, 07/07/2020
How to Help Ensure Compliance with Data Privacy Laws
If complying with data privacy laws like the GDPR, PDPA, CPA, HIPAA, PCI DSS, PIPEDA, and more sometimes feels like swimming in alphabet soup, there is a life preserver that can simplify, secure, and automate the processes involved. Managed file transfer can proactively help organizations meet...
Blog
What is NIST?
By Heath Kath on Wed, 02/26/2020
NIST, the National Institute of Standards and Technology, is a lab and non-regulatory federal agency of the U.S. Department of Commerce. Founded in 1901 as a tool to boost the U.S.'s global competitiveness, NIST fosters efforts to create standards across technology systems. Today, NIST continues to push for innovation in a variety of industries...