Blog

Blog

Securing Data in SharePoint and Other Cloud Applications with MFT

Organizations adopting cloud-based storage platforms as their go-to for the mountains of data they want retain and work with do so for a number of reasons, including flexibility, scalability, and potential cost savings. However, security and control over sensitive data may be sacrificed if key security gaps aren’t closed.Even popular, user-friendly platforms such as SharePoint, Dropbox, and...
Blog

FTP vs. SFTP: Considerations for Secure File Transfer

Businesses today rely on the safe transfer of data to operate securely in today’s digital economy. There are several protocols that can be used for this purpose, and each offers a different benefit to your organization. File Transfer Protocol (FTP) has been around longest and is the default file transfer method for many companies with legacy...
Blog

Collaboration Tools Like Box.com vs. MFT: What Do You Really Need?

Collaboration tools like Box.com and managed file transfer (MFT) tools like GoAnywhere MFT, are not the same. Both, however, have unique advantages, depending on your organization’s requirements around data. Box is a cloud-based tool for organizational teams to collaborate, manage, and store content. GoAnywhere MFT is a secure managed file transfer...
Blog

How MFT Helps Collaboration in Hybrid Environments

Whether your organization’s employees are back in the office at their desks full time, or more commonly pop into your brick-and-mortar location two to three times a week in hybrid fashion, it’s important to consider how they can securely collaborate. The changing work landscape, with workers spread throughout the world, and schlepping their laptops...
Blog

FTP 101: What are the Basics?

There's no shortage of shortage when choosing just the right FTP for your organization. Learn the differences and which FTP may be right for you.
Blog

Education Industry: How MFT Can Help Stretch Resources

Educational institutions, from preschools to university systems, face increasing pressure on budgets as well as personnel lately. When every minute and every dollar counts, bolstering existing resources where possible can offer a bit of relief.One way to stretch those human resources is by automating some of the tasks that are repetitive, mundane, and...
Blog

Cybersecurity Tips: Boost File Security During Busy Holiday Season

Tis the season to be cautious when it comes to cybersecurity. With the holly jolly season upon us, it’s important to remember that there are a bunch of clever Grinches out there, determined to snatch your organization’s or your personal data for financial gain.Holiday Scams: A Cybersecurity Lump of CoalBlack Friday and Cyber Monday may have come and...
Blog

Implementing File Transfer Strategies for Cybersecurity

So, you did your legwork and identified your cybersecurity needs around transferring files securely. You found your best secure file transfer solution by checking out a few top choices based on reviews, trials and maybe even a demo or two. And now that you’ve got the green light for your chosen secure file transfer solution, it’s time to put it to...
Blog

What Your Organization Needs to Know About Secure File Transfer

It’s safe to say that the last few years have significantly increased the demand for Secure File Transfer (SFT) solutions such as GoAnywhere MFT. When the pandemic made vast numbers of the working population work from home almost overnight, there was a sudden spike in the requirement for robust and effective SFT. People needed to share documents...
Blog

PCI DSS 4.0 - What to Expect, What's Coming, How to Comply

Get ready for more stringent PCI DSS compliance requirements. The PCI Security Standards Council (PCI SSC) updated its version 4.0 requirements in March 2022, in large part to address increasingly sophisticated cybercriminal threats. Rapidly growing contactless and cloud-based card usage also helped nudge an update to PCI DSS requirements, which...
Blog

Are SSH and SFTP the Same?

Are SSH and SFTP the Same?SSH and SFTP are a classic pair. They intertwine when it comes to securing communication, and while they have similar capabilities, they are not the same thing. So, what’s the difference between them? Read on to find out. What is SSH?Secure Shell (SSH) is a transport layer that is used to secure...
Blog

This Month in Cybersecurity: The Weather is Heating Up and So Are Cyberattacks

At the time of writing, much of Europe and the U.S. is in the midst of a major heatwave, delivering record temperatures and concerns about climate change. Just as the heat is rising, so is the threat of cyberattacks. New data has emerged that reveals 2022 is looking like it could be the worst year ever for cybersecurity in terms of the volume...
Blog

4 Ways You Can Use Your Digital Rights Management Tool

In an increasingly collaborative work environment, it’s more important now than ever before that your organization has the highest level of visibility and control possible over its data. While knowing how to choose the right data security solutions such as managed file transfer, data classification, and more is a challenge in and of itself,...
Blog

What Do Emerging Data Privacy Laws in the U.S. Mean for You?

What is Data Privacy? One can think of data privacy as all the processes involved in how confidential or personal information or data is collected, used, and shared or governed. No singular policy governs data privacy, with requirements and penalties varying across states and countries. Data privacy laws are legal constructs that set clear lines...
Blog

Largest Data Breaches in Last 10 Years

Bigger is often better. A bigger slice of pizza or a bigger paycheck sounds pretty nice. An extra-large data breach, not so much.Listing out the biggest data breaches of all time can be challenging, as the next big one could be right around the corner. At the time of this writing, reports are out that the Personally Identifiable Information (PII) of 1...
Blog

Lessons Learned from the REvil Ransomware Attack of 2021

Fireworks lighting up the sky, the smell of backyard grills cranking out delicious food, and organizations reeling from massive global cyberattacks. Aaah….those not-so-sweet memories of that first weekend in July 2021, when hundreds of businesses were smacked with the financial, logistical, and reputational ramifications of ransomware attacks. ...
Blog

This Month in Cybersecurity: Summer is Here, but There’s No Vacation From Cyberattacks

June generally marks the start of summer, although anyone thinking the cyber criminals will take a few months off should probably think again. Not only has one of most sacred of summer institutions – Wimbledon – been subject to a threat, but fresh attacks and threats emerged all over the world. It’s clear that organizations must remain vigilant...
Blog

What is the Smominru Botnet?

What is the Smominru Botnet? Though its origins date back to 2017, Smominru is a dangerous botnet that has been making headlines recently as it continues to spread, attacking targets in every industry. Smominru, which also operates under known variants like including Hexmen and Mykings, has infiltrated hundreds of thousands of machines,...
Blog

Secure File Sharing for Banks Gets a Boost from GoAnywhere MFT

Secure file sharing for banks has always been of utmost importance and is only gaining traction in the face of common cybersecurity threats and compliance requirements alike. Requirements like PCI DSS, GDPR, GLBA, and more can make processes more complicated, even as the safeguards outlined within them promote data security to protect both...
Blog

What is Ransomware and How to Detect and Prevent It

What is Ransomware?Let’s start with the basics. The simple definition of ransom is “a consideration paid or demanded for the release of someone or something from captivity.” Ransomware, then, is a way for bad actors to encrypt information and hold it ransom in exchange for money—typically untraceable bitcoin.There are four main ways that hackers...