Blog

Blog

Dropbox File Transfer Acceleration

What is Dropbox? Dropbox is a file hosting and sharing service used both as a personal cloud storage solution and as a file collaboration tool for businesses. It supports most types of files, including text, video, graphics, and audio. Because Dropbox is cloud-based, you can use it from anywhere. This makes it a top choice for those who work from home or on location rather than in the corporate...
Blog

What is Mobile Malware?

Meet Mobile Malware Mobile malware is a malicious kind of software that hackers use to specifically target and collapse operating systems on smartphones, tablets, and smartwatches in order to steal confidential data. Generally speaking, mobile devices aren’t as secure as computers. So, it’s not a stretch that the same security measures organizations...
Blog

What is Zero Knowledge Encryption?

What is Zero Knowledge Encryption?If zero knowledge means every piece of information is absolutely confidential, and all data remains only with the user of a software or service, how does zero knowledge apply to encryption?Zero knowledge encryption basically states that data is kept secure via a unique user or encryption key, one that even the...
Blog

What is the DROWN Attack?

What is the DROWN Attack? The Decrypting RSA with Obsolete and Weakened eNcryption (DROWN) Attack is a serious vulnerability that affects HTTPS and other servers that rely on Secure Sockets Layer (SSL)/Transport Layer Security (TLS). Essentially DROWN is an attack vector that leverages a cross-protocol bug in servers that support modern...
Blog

What is iPerf and How to Use It

What is iPerf?iPerf, which is short for Internet Performance Working Group, is an open-source speed test and network performance measurement tool. The mechanism is fairly simple: it creates TCP and UDP streams, and sends traffic from one host to another, then reports the maximum bandwidth to the user. This allows users to determine network throughput and top bandwidth speed.Originally called ttcp...
Blog

Is MFT Dead?

As cybersecurity technology continues to advance, some might ask whether secure MFT is fading away as a viable option for organizations to use for their file transfer needs. If organizations do choose to utilize MFT for their secure file transfer purposes, they will certainly select the best MFT software they can. The bottom line is that MFT will not...
Blog

How Big Are Movie Files?

Gone are the simple days of moving pictures and practical effects. These days, movies are more sophisticated, with computer-generated special effects and high-resolution images. However, each addition to a film or episode adds to the file size, which can make both downloading for at-home viewing and the process of creating the project more complicated than ever before. While large movie files...
Blog

File Transfer for Live Events

There are many organizations that require the ability to transfer large files fast, sometimes in the moment, to manage the requirements of live events. Fast media file transfer is important for many organizations and events: as they say, time is of the essence and live events are no exception. For organizations looking for a speedy solution to their live event needs, there is a solution that...
Blog

The Surprising Relationship Between Data Privacy Laws and File Sharing

Location, location, location. Not just the mantra of realtors and would-be buyers – it’s also a concern for data security professionals world-wide. As cloud computing has ramped up across industries, the physical location of stored data has been called into question, alongside concerns stemming from data privacy laws.Read on to discover how data...
Blog

How to Transfer Files Faster

There are many options for transferring files but not all of them can complete file transfers quickly. When considering transfer distance length and bandwidth predicaments, the speed of file transfers can be called into question even more easily. So, what tools can organizations use to achieve file transfers at high speeds to save time and money without sacrificing core security functionality? If...
Blog

HTTP vs. TCP: What's the Difference?

HTTP vs. TCP Hypertext Transfer Protocol (HTTP) and Transmission Control Protocol (TCP) are both computer protocols involved in the transfer of data, but while they individually serve their own purpose, they have a close relationship. Let’s break down what HTTP and TCP actually are, what sets them apart, and how they work as a pair. What is...
Blog

What Are the Current Cyber Threat Trends in 2021?

Many current cyber threat trends hinge on change and uncertainty caused by the COVID-19 pandemic. Whether it’s a panicked email recipient falling for a phishing scheme, innovations in ransomware, or simply remote workforces offering larger surfaces to attack, the goal of each is to find gaps in your company’s cyber security armor.Here are the old, new...
Blog

Is SFTP a Good Choice for Enterprise-level MFT?

Organizations large and small face hundreds of decisions each day – some more critical than others, but all with potentially large-scale impact on employees, trading partners, and customers. When it comes to deciding how to best collaborate and share often-sensitive, proprietary files across your organization, carefully weighing available file...
Blog

What is Ransomware-as-a-Service (RaaS)?

What is Ransomware-as-a-Service (RaaS)?Ransomware-as-a-Service (RaaS) is a new pay-for-use business model used by ransomware developers where malicious actors (known as affiliates) can outsource or lease already-developed ransomware attacks the same way legitimate software developers lease Software-as-a-Service (SaaS) products.Because RaaS is a...
Blog

This Month in Cybersecurity: E-Reader Threats and More

In the last month, a lot has happened in the world of cybersecurity. Cyber threats are more numerous than ever before, which has brought both private sector and government organizations to take remediation actions seriously. Let’s break down some of the biggest stories of the last month. ...
Blog

Need Fast File Transfers? FileCatalyst Delivers.

Got a Need for Speed? FileCatalyst Can Deliver. “How fast?" If that’s the very first thing that comes to mind when thinking about transferring files, you clearly have a need for speed. And if file transfer speed is critical to your business operations, FileCatalyst by Fortra may be the right match for you. Fortra acquired FileCatalyst in early...
Blog

The Top Tips for Optimizing File Transfer Productivity

The Top Two Tips for Optimizing File Transfer Productivity Transferring data securely from point A to point B is a non-negotiable for most organizations. However, that doesn’t mean that the process needs to be tedious. Don’t get bogged down by old file transfer methods that are slow and unreliable. Rather, optimize your productivity with the...
Blog

Ransomware Attacks on Small Businesses: How to Mitigate

More than fireworks exploded as Americans were prepping for Independence Day celebrations as hundreds of companies awoke on July 3rd to yet another massive ransomware attack.This attack attempted to cripple the networks of up to 200 companies and up to 1,500 downstream businesses. All signs point to it being the handiwork of a ransomware organization...
Blog

This Month in Cybersecurity: Bolstering Defenses and Best Practices

Every day, cybersecurity becomes more important for businesses. Organizations have a need to protect their customer data and the number of attacks that businesses have experienced has increased. The bottom line is that cybersecurity news and best practices are important to pay attention to. Without further ado, let’s get into some of the latest...
Blog

3 Reasons to Enhance MFT With Fast File Transfer Solutions

For many organizations, the first step toward optimizing workflows and sharing information securely is adopting a managed file transfer (MFT) solution. This is a major step that can change a lot in the way organizations conduct their business and the bottom line is that it can be a lucrative and much more secure decision to make. That being...