Blog

Blog

Meet Essential Eight Maturity Requirements with MFT

The purpose of Australia’s Essential Eight is to provide a clear, easy-to-follow set of guidelines that can be applied to protect Australian organizations and their information technology systems against cyberattacks.The Essential Eight Maturity Model helps support the implementation of Essential Eight principles and provides a transparent assessment of how easy an organization’s systems are to...
Blog

How MFT Supports the NIS2 Directive and Oct. 2024 update

If you are not yet up to speed on the latest developments around the European Union’s (EU) NIS2 Directive, get ready, as they go into effect Oct. 17, 2024. That’s when Member States are required to have transposed the directive into national law. EU countries must have their national legislation on par with the NIS2 requirements and comply with the new, broader requirements. This update aims to...
Blog

Folder Encryption Supports Financial Compliance

Encrypted Folders in MFT Can Help Meet Financial Industry Compliance RequirementsOrganizations in the financial sector that need to meet compliance requirements for PCI DSS, GLBA, or SOX can benefit from folder encryption functionality in their Managed File Transfer (MFT) solution. Utilizing folder encryption can help meet the mandate to encrypt sensitive data both in transit and at rest (or not ...
Blog

Securing Data in SharePoint and Other Cloud Applications with MFT

Organizations adopting cloud-based storage platforms as their go-to for the mountains of data they want retain and work with do so for a number of reasons, including flexibility, scalability, and potential cost savings. However, security and control over sensitive data may be sacrificed if key security gaps aren’t closed.Even popular, user-friendly platforms such as SharePoint, Dropbox, and...
Blog

How Organizations Are Using MFT Today

Once housed in the echelons of “industry best practice,” managed file transfer (MFT) is now becoming common practice for organizations across any industry. Here are how some of those businesses are using MFT today to secure and automate their file transfers. Automation One of the most prominent uses for MFT is replacing manual processes and custom scripts with set-it-and-forget-it ways to manage...
Blog

How Are You Doing with PCI DSS v4.0 Compliance?

As of March 31, 2024, organizations in the payments industry will need to comply with all new PCI DSS v.4.0 requirements. Find out what the new obligations will be, how to tie them into your enterprise, and how Fortra can help.For many organizations, 2024 will be a big year. Aside from focusing on increasing revenues, market share, and demand, there...
Blog

How MFT Helps the Insurance Industry Secure Files

Insurance industry insiders know an insurance policy is one of the few products purchased that most people hope to never have to put to use. Afterall, “using” your insurance means that an adverse event has occurred – an auto accident, medical crisis, storm damage, or any number of situations where not having a policy in place could have huge financial...
Blog

Hardening Your MFT Environment: A File Security Essential

Congratulate yourself if you already have a secure, managed file transfer (MFT) solution in your organization. You’ve taken a proactive step towards addressing growing cybersecurity concerns around the exchange of your sensitive, often business-critical files.While robust file transfer solutions can offer security, automation, and a streamlined way to...
Blog

What is a TFTP Server?

What is a TFTP Server? TFTP, or Trivial File Transfer Protocol lives up to its name as it is a lightweight, simple protocol used to send files across a network. The server of this “trivial” protocol allows computers in and out of an organization’s network to exchange files using TFTP. As a lightweight protocol, there is less complexity, and therefore...
Blog

What We Learned in Our Inaugural State of Cybersecurity Survey

No one knows the challenges of securing an organization like the professionals who carry that responsibility daily. We set out to better understand the things they deal with and what they plan to focus on in our inaugural 2024 Fortra State of Cybersecurity Survey. Here are five key takeaways from the survey. 81% Call Phishing and Smishing Top Security...
Blog

Building Strong Software Through Third-Party and Internal Testing

In my last post I wrote about protecting the supply chain and how strong bricks make strong walls, referencing how creating software with strong internal components and securely crafted code adds strength to the enterprises using that software. When considering any component being added into an environment, evaluating its security posture and attack...
Blog

On-Premises vs. Cloud: Which File Transfer Method is Best for You?

If your organization is debating between on-premises and cloud deployment for your business-critical file transfer needs, there are a few considerations around compliance, resources, and infrastructure to help you determine which option makes the most sense for your organization. “If you’re already using an on-premises solution, any discussion of a...
Blog

Sharing Financial Files: Benefits of MFT

Financial file matters matter. Not only are these files a top priority to the banks and financial institutions that handle millions of transactions daily, they also matter to the industry’s compliance regulators, and to the public trusting that their financial information is secured. How organizational and personal financial data is handled and...
Blog

Transferring Government Files: MFT Addresses Biggest Challenges

Whether big government or small, assuring the security of files in the public sector is of utmost importance for security, as well as assuring any information from citizens is protected. According to 2021 US Census data, there are 90,000 government entities. Protecting the data these agencies handle is admittedly a big lift.Not only are government...
Blog

FTP vs. SFTP: Considerations for Secure File Transfer

Businesses today rely on the safe transfer of data to operate securely in today’s digital economy. There are several protocols that can be used for this purpose, and each offers a different benefit to your organization. File Transfer Protocol (FTP) has been around longest and is the default file transfer method for many companies with legacy...
Blog

WAFs Add Layer of Security When Using Web-based Apps

If your organization uses any web applications to conduct essential business functions to boost productivity and collaboration, and provide an easy, customer friendly way to deliver services, you should consider solutions that incorporate a WAF, or Web Application Firewall. A WAF is a firewall specifically targeting the application layer —...
Blog

Secure Cloud File Transfers: Best Practices for Organizations

In today's data-driven world, organizations increasingly rely on the cloud to transfer files securely and efficiently. Whether you are working in a pure cloud environment, a hybrid setup, or leveraging Managed File Transfer as a Service (MFTaaS), ensuring the security of your file transfers is paramount. In this blog, we'll explore the best...
Blog

Considerations for Cloud File Transfers

Whether your organization is debating on moving your file transfer process entirely to the cloud, adopting a hybrid environment, or using a hosted SaaS solution, review the considerations below to help better clarify and get the organizational support needed for a cloud-based file transfer solution. There are no absolute right or wrong answers to...
Blog

Protecting Vital Government Information with MFT

When it comes to information security, few industries top the government – at all levels – when it comes to requirements and compliance designed to protect the sensitive data it collects, manages, and exchanges. And while it may seem like just more red tape, these standards and requirements are for the benefit of the people as well as the...