Resources

Blog

Benefits of Single Sign-on (SSO)

More than one is usually a good thing. More french fries, more vacation days, more friends. More usernames and passwords? Not so much.Organizations are increasingly turning to single sign-on (SSO) to lessen the burden of employees needing to remember endless usernames and passwords to access all the applications, websites and data to do their daily...
Blog

How to Revamp Your Organization's Cybersecurity Program

When cyberattacks and data breaches make the news, it’s usually because they’re at large companies like Facebook or healthcare organizations. But every organization, large or small, needs to be concerned about cybersecurity; hackers have begun to understand that, while smaller companies may have less data on hand, they may have access to covetable...
Blog

What is Wrong With Free File Transfer?

Free time! Free food! Free kittens! All great concepts, right? Free file transfers! Ummmm, not so much. The old adage, “If it sounds too good to be true, it probably is…” definitely holds when it comes to file transfers. After all, the data you send to third-parties, vendors, customers and even internal staff is priceless and, in the wrong hands...
Blog

Going Beyond File Transfer

Intergalactic – or at least global – organizations of all sizes use GoAnywhere MFT to securely transfer data while saving time, money, and valuable resources. But moving files from one place to another is just the start of the GoAnywhere adventure.GoAnywhere MFT has built-in elements that anyone can access from their first login alongside pick-and...
Blog

Top Data Breaches of 2019: How You Can Minimize Your Risks

Top Data Breaches of 2019: How You Can Minimize Your RiskYour organization made the headlines! That’s great, right? Not if it’s because you had sensitive data breached. A data breach can wreak financial and logistical havoc for you, your customers, patients, employees, and others. More importantly, it can severely impact the reputation you’ve so...
Blog

Resolve to Make Files More Secure in the New Year

Make Resolutions - AND Keep ThemResolutions. Every year you make them. Every year you break them. Make 2020 the year you finally resolve to make your file transfers more secure. Do it — even if you’re a stranger to the gym, you still sport those extra 10 pounds and haven’t called your mom in a week.Don’t wait until mid-January to feel guilty about...
Blog

Comparing Transfer Methods: HTTP vs. FTP

HTTP vs. FTP for File TransferHyper Text Transfer Protocol (HTTP) and File Transfer Protocol (FTP) are both application layer protocols that can allow you to transfer files between two systems, but what’s the difference between them – and which one performs better? Or, is there a better solution that outperforms both? Read on to find out!What is HTTP...
Blog

PDPA in Singapore Helps Protect Personal Data

What is the PDPA of 2012?The Personal Data Protection Act of 2012 (PDPA) is a law designed to regulate and enforce the proper collection, use, disclosure, and care of the personal data of citizens in the Republic of Singapore. The Personal Data Protection Commission (PDPC) is charged with establishing policies and for reviewing organizational actions...
Blog

SCP vs. SFTP: Which is Better?

The Secure File Sharing Matchup: Differences Between SFTP and SCPWhen sizing up SFTP vs. SCP you’ll find that the two file sharing protocols are quite similar. And, for some file transfer situations, they could be nearly interchangeable. Your need for speed, functionality and security will determine which protocol is best for you.SFTP vs. SCP: the...
Blog

Need a Cloud-Based MFT Environment? Try a Hybrid Cloud Setup

Cloud integration is growing in popularity, but committing 100% to the cloud isn’t always practical or secure for organizations. If you’re in the market for cloud-based solutions, read our quick overview below. For a more comprehensive exploration of when to choose a hybrid cloud and how keep your data encrypted through and after the transition to a...
Blog

10 Cybersecurity Tips and Best Practices

The 10 Best Cybersecurity Tips and Practices – as Told by IT Professionals Although there’s a lot of tips and best practices out there when it comes to cybersecurity, it’s important to make sure they’re coming from the right source. With October being National Cybersecurity Awareness Month, now is the perfect time to brush up on some of...
Blog

What are SFTP Servers?

What are SFTP Servers?A typical file transfer server helps transfer files server-to-server or client-to-server, and SFTP servers are a more protected version: they encrypt data to keep sensitive information secure while moving files, and some have the added bonus of encrypting files at rest. SFTP servers use a single data channel in which login...
Blog

What Port Does SFTP Use?

Different Protocol, Different Port Ports, also known as channels, are an integral part of the successful delivery and communication process of secure files. Although the specific protocols that operate on these ports makes the most difference, are you aware of which actual port SFTP uses? What is SFTP? SFTP (SSH File Transfer Protocol...
Blog

Open PGP and GoAnywhere MFT: What You Need to Know

Which Solution is Right for You? Open PGP vs. GoAnywhere MFT If you have sensitive files that need to get from point A to Point B securely, you may have considered utilizing Open PGP or a managed file transfer solution, like GoAnywhere MFT. Do you know which option is the best fit for your organization? What is Open PGP? Open PGP is...
Blog

Which is Faster: FTPS or SFTP?

FTPS vs. SFTPYou may have heard of FTPS and SFTP, but chances are that you may not be super familiar with them. If you haven’t had a chance to dive in deep, read on for a more in-depth look into FTPS, SFTP, and which of the two is faster.What is FTPS?FTPS (FTP over SSL/TLS), or File Transfer Protocol over Secure Sockets Layer/Transport Layer Security,...
Blog

What is Operation Yellowhammer and How Does it Affect Data Transfers?

What is Operation Yellowhammer? If you are located in the United Kingdom (UK), then you may already be familiar with Operation Yellowhammer and its relationship to Brexit and the European Union (EU). For those of you that haven’t been briefed on Operation Yellowhammer and how it relates to Brexit, now is the perfect time to learn how this...
Blog

Which is Better? - AS2 vs. AS4

AS2 vs. AS4AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and which of the two is better?What is AS2?AS2 (Applicability Statement 2) is a protocol specification that’s used to transmit sensitive data securely and reliably...
Blog

GDPR: Understanding the 8 Rights of Data Subjects

Find out what these new rights mean for your organization and how you can prepare. GDPR (General Data Protection Regulation) is the EU’s new legal framework that replaced the EU Data Protection Directive in May 2018. While the directive was merely a recommendation, GDPR carries the force of law. The purpose of GDPR is similar to...
Blog

Think Your Customer Data was Exposed? Follow These Steps

When a prospect or customer shares personal data with a business, they expect their information will be stored securely, kept safe from vulnerabilities, and used only for the purposes with which it was collected. Whether this data is an email address, a birthday, a personal identifier, or credit card numbers, the weight of trust placed on this...
Blog

Is FTP Dead?

Is FTP still a viable option for sending file transfers? While organizations across all industries have started shifting to secure FTP protocols like SFTP and FTPS, a surprising number of businesses still use FTP to transfer sensitive documents across internal and external networks. The search "how to use FTP" comes up with over 163 million...