Blog

Blog

Key Cybersecurity Takeaways from the EasyJet Data Breach

A data breach can wreak financial and logistical havoc for companies who experience them, not to mention customers, employees, and others who depend on or work with the breached organization. And even though it seems like data breaches are becoming more pervasive, they continue to severely impact organizations’ carefully built reputations – and may...
Blog

What is the PDPC?

Governments are taking more steps than ever to protect their citizens’ personal data online – and some have been doing so for longer than others. Singapore’s Personal Data Protection Commission (PDPC) was established in 2013, and since then has helped to foster privacy regulations for citizens of the Republic of Singapore.What is the PDPC?The...
Blog

“Final Fantasy VII Remake Cancelled?” How Fast File Transfers Prevent This Situation

Over the past ten years, the gaming industry has ballooned into one of the main producers of large data files. You blink and a new gaming system is released, with accessories, games and expansion packs. In 2015 it was announced at E3 that Nintendo would be releasing a remake of the beloved Final Fantasy 7 and since then the countdown has been on. This game is jam-packed with nostalgia for many...
Blog

3 Ways File Transferring Advance the Healthcare Industry

The world can be an intimidating place, new battles consistently arise for the healthcare and life sciences industry. Research is the key to preventing and defeating these challenges. Often work is kept behind the scenes and the average person forgets how much data this industry creates and the importance this data holds. The files that the healthcare and life sciences industry produce could...
Blog

What is NIST?

NIST, the National Institute of Standards and Technology, is a lab and non-regulatory federal agency of the U.S. Department of Commerce. Founded in 1901 as a tool to boost the U.S.'s global competitiveness, NIST fosters efforts to create standards across technology systems. Today, NIST continues to push for innovation in a variety of industries and...
Blog

What are the Secure Messaging Standards in Australia?

Secure Messaging in HealthcareHealthcare is essential to live a healthy life, but it shouldn’t come at the expense of your privacy.Healthcare is an industry that will always be growing, which means that if your situation transitions to a place where you need to see a new doctor or a specialist, your very private and personal health records will need...
Blog

What is the California Consumer Privacy Act?

The California Consumer Privacy Act (CCPA), the latest data privacy law in the Golden State, went into effect on January 1st, 2020. Some have compared it to the UK’s GDPR (General Data Protection Regulation), and they’re not far off – like the GDPR, the CCPA is intended to protect individuals’ private data by making data collection and usage more...
Blog

What is PIPEDA?

PIPEDA, the Personal Information Protection and Electronic Documents Act, is a privacy law that applies to private-sector organizations and businesses throughout Canada.The goal of PIPEDA is to ensure that all provinces and territories protect personal data. This includes:Asking for and obtaining consent when an individual’s information is initially...
Blog

How Banks are Benefiting from MFT Integration

Trying to integrate and tie diverse internal and external banking applications, branches, systems and trading partners together so they work seamlessly with internal and central banking applications can have your IT department constantly untangling complex knots to ensure transactions and information flows easily.There is a way to untangle this...
Blog

PDPA in Singapore Helps Protect Personal Data

What is the PDPA of 2012?The Personal Data Protection Act of 2012 (PDPA) is a law designed to regulate and enforce the proper collection, use, disclosure, and care of the personal data of citizens in the Republic of Singapore. The Personal Data Protection Commission (PDPC) is charged with establishing policies and for reviewing organizational actions...
Blog

7 Essential Resources on PCI DSS Security

Note from the Editor: This article was originally published in February 2017. It has been updated with resources current to PCI DSS version 3.2.1.Did you know that 80% of organizations are not compliant with PCI DSS requirements? That means, if you’re reading this, there’s a pretty good chance your company needs to make adjustments to ensure a fully...
Blog

Should You Get Extended Customer Support? FileCatalyst’s Top 3 Reasons Why It’s Worth It

Whether you are purchasing the next trending iPhone or a powerful fast file transfer solution, support is always a bonus feature that provides you a team in your back corner. This sense of security takes a weight off of your shoulders because you know that assistance will be there to alleviate the stress that comes with updates, crashes, and more. Support is undervalued within the world of...
Blog

Netflix Series Black Mirror, Highlights Data Protection– 3 Reasons Why You Should Listen

For good or for bad, the popular NetFlix television show, Black Mirror has global audiences overwhelmed with the future possibilities for technology. The show’s creators appear to have sought out the most extreme plotlines around technological threats, leaving us with digital nightmares. While Black Mirror mainly tackles the negative aspects of the potential advancement in technology, it does...
Blog

Meeting IT Security and Compliance Requirements with GoAnywhere MFT

Meet your IT and compliance requirements easily with GoAnywhere MFT. GoAnywhere helps organizations and IT professionals comply with an array of strict regulations, methods, and technologies. To open a larger, clickable image, choose the "Download" option below.DOWNLOAD For more of an in-depth look into...
Blog

GDPR: Understanding the 8 Rights of Data Subjects

Find out what these new rights mean for your organization and how you can prepare. GDPR (General Data Protection Regulation) is the EU’s new legal framework that replaced the EU Data Protection Directive in May 2018. While the directive was merely a recommendation, GDPR carries the force of law. The purpose of GDPR is similar to...
Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll want to pay close attention...
Blog

I’ve Just Been Breached, Now What?

So, you think (or perhaps you know) you’ve been breached. It’s every organization’s nightmare, and you’re living it, facing local and federal fines, upset customers, public panic, and a loss of intellectual property. A breach can be a harrowing ordeal; if you’re not sure what to do immediately after discovering the breach, your situation can...
Blog

How 3 Financial Institutions Solve File Transfer Needs with MFT Software

On a scale of 1-10, how would you rate the efficiency of your file transfers right now?If you use manual scripts, legacy software, or a myriad of free tools to balance your encryption, automation, cybersecurity, reporting, and collaboration needs, it’s possible you’ll rate your efficiency low on the scale. After all, professionals in banking and...
Blog

High-Performance Computing (HPC) in Oil & Gas

When it comes to the digital oilfield, High-Performance Computing (HPC) is an asset to be relied upon. From upstream discovery and the mapping of ocean floors to production, optimization and design; powerful HPC systems are analyzing, interpreting and manipulating unfathomable amounts of data.FileCatalyst has been helping a number of natural resources companies accelerate their workflows by moving...
Blog

AI Across Industries – Where We Are, Where We’re Going

HAL 9000 might be closer, more useful and friendlier than we think. Artificial Intelligence (AI) might not be here in a fully realized form yet, but it’s already disrupting a lot of industries that we work in.As our customers discuss, question and evaluate the ways they can leverage AI to help streamline their workflows, I thought that I’d share some of the ways industry leaders leverage AI across...