Blog

Blog

This Month in Cybersecurity: The Weather is Heating Up and So Are Cyberattacks

At the time of writing, much of Europe and the U.S. is in the midst of a major heatwave, delivering record temperatures and concerns about climate change. Just as the heat is rising, so is the threat of cyberattacks. New data has emerged that reveals 2022 is looking like it could be the worst year ever for cybersecurity in terms of the volume...
Blog

4 Ways You Can Use Your Digital Rights Management Tool

In an increasingly collaborative work environment, it’s more important now than ever before that your organization has the highest level of visibility and control possible over its data. While knowing how to choose the right data security solutions such as managed file transfer, data classification, and more is a challenge in and of itself,...
Blog

Largest Data Breaches in Last 10 Years

Bigger is often better. A bigger slice of pizza or a bigger paycheck sounds pretty nice. An extra-large data breach, not so much.Listing out the biggest data breaches of all time can be challenging, as the next big one could be right around the corner. At the time of this writing, reports are out that the Personally Identifiable Information (PII) of 1...
Blog

Lessons Learned from the REvil Ransomware Attack of 2021

Fireworks lighting up the sky, the smell of backyard grills cranking out delicious food, and organizations reeling from massive global cyberattacks. Aaah….those not-so-sweet memories of that first weekend in July 2021, when hundreds of businesses were smacked with the financial, logistical, and reputational ramifications of ransomware attacks. ...
Blog

This Month in Cybersecurity: Summer is Here, but There’s No Vacation From Cyberattacks

June generally marks the start of summer, although anyone thinking the cyber criminals will take a few months off should probably think again. Not only has one of most sacred of summer institutions – Wimbledon – been subject to a threat, but fresh attacks and threats emerged all over the world. It’s clear that organizations must remain vigilant...
Blog

What is the Smominru Botnet?

What is the Smominru Botnet? Though its origins date back to 2017, Smominru is a dangerous botnet that has been making headlines recently as it continues to spread, attacking targets in every industry. Smominru, which also operates under known variants like including Hexmen and Mykings, has infiltrated hundreds of thousands of machines,...
Blog

What is Ransomware and How to Detect and Prevent It

What is Ransomware?Let’s start with the basics. The simple definition of ransom is “a consideration paid or demanded for the release of someone or something from captivity.” Ransomware, then, is a way for bad actors to encrypt information and hold it ransom in exchange for money—typically untraceable bitcoin.There are four main ways that hackers...
Blog

Why it’s Time to Adopt Zero Trust Architecture

If you work in cybersecurity, the chances are that you will have come across the phrase Zero Trust over the past few years. It’s become a real industry buzzword, but there is substance behind the noise on this occasion. To the outsider, it’s a term that is easy to misinterpret. It sounds draconian and severe and could be perceived as...
Blog

End-to-End Rights Management Made Simple with SFT

Digital files are the crown jewels of any organization, and end-to-end rights management is increasingly the goal of businesses who need to transfer files securely. How can organizations ensure data is secure from inception to publication, especially when third parties enter the picture?Enter secure file transfer plus digital rights management. These...
Blog

A Ransomware Special - WannaCry’s Anniversary and More: This Month in Cybersecurity

May’s ‘this month in cybersecurity’ is somewhat of a ransomware news special. In addition to a ransomware attack on Costa Rica and the continued expansion of BlackByte, this month also marks the fifth anniversary of WannaCry, perhaps the most damaging malware attack the world has seen.Ransomware remains hugely prevalent, but is an attack likely to...
Blog

What is Ryuk Ransomware?

The last few years have seen a rise in stories about Ryuk, a powerful piece of ransomware that is best known for targeting healthcare institutions, but has also been attacking municipal governments, state courts, enterprises, and large universities, among others. Many of these organizations have paid hefty fees – between $100,00 and $500,000,...
Blog

This Month in Cybersecurity: Time for a Spring Clean?

Spring is the time of year when people start thinking about decluttering, cleaning, and readying themselves for the next season—spring cleaning. It's a tradition that dates back centuries, but it could also be applied to an organization's cybersecurity. There’s never a bad time to reflect on how best to keep your organization safe, especially...
Blog

Data Security Measures for the Return to Office

Whether your employees are headed back to the office enthusiastically, with a bit of dread, or a mix of emotions, they’ll bring with them more than just their laptops, lunches, and stories from their work-from-home days upon their return. They’ll also potentially be bringing along some data security risks.While risks around unauthorized file sharing,...
Blog

5 Ways Government Can Improve Cybersecurity Resilience

Cybersecurity for Government is CrucialIn these trying times government agencies everywhere must be resilient when it comes to cybersecurity.Cyber resilience is an organization’s ability to prepare for, respond to, and recover from cyber threats. A cyber-resilient organization can adequately adapt to known and unknown crises, threats, adversities, and...
Blog

What is India's Personal Data Protection Bill?

The EU’s GDPR paved the way for data privacy and protection laws around the world, and one of the latest is the emerging Personal Data Protection Bill in India. While organizations in India already adhere to international data privacy laws, including GDPR when serving overseas customers, as well as the restrictions set out in 2000’s Information...
Blog

Secure File Transfer for Supply Chain Risk Management

Supply chain attacks are one of the fastest-growing cyber risks that organizations face in 2022, and when it comes to supply chain risk management, organizations in every industry should pay attention.There have always been efforts to help organizations understand and mitigate risks related to supply chain, and recent initiatives, including the U.S.’s...
Blog

Shadow IT and Work From Home: The Risks and Solutions

Working 9 to 5 is no longer the only way to make a living, and for the foreseeable future, organizations parking most of their employees at a particular desk Monday through Friday is looking less and less likely. Working from home, at least as part of a hybrid organizational structure, is here to stay. Whether working from home, in a hybrid...
Blog

Tainted Love, Ransomware, and More: This Month in Cybersecurity

February, while a short month, was long on cybersecurity threats. Read on for a few of the high- (well, low-lights) as well as for some resources from GoAnywhere MFT on how you can help secure your sensitive data files while they are in motion and in transit. Love Hurts The search for love turned up more than potential partners over the last...
Blog

How the Coronavirus Has Changed Data Security

COVID-19 Has Made a Lasting Impact on Data SecurityThe Coronavirus pandemic has altered many things in this world and data security is no exception. Along with the solid impact COVID-19 has made on data security, let’s highlight some of the other key ways lasting change has been made within businesses.The Lasting Change: Working from HomeAs of 2022,...
Blog

How to Send Big Files Quickly

Big and fast. Speedy and large. It’s a combination that’s sometimes tricky to execute, especially when it comes to sending large data files rapidly. Do you sacrifice speed? Do you risk having files interrupted mid-stream? Or do you roll the dice and hope your file won’t be rejected from the starting gate? You don’t have to make these kinds of...