Blog

Blog

Improve Your Big Data File Transfers: 11 Security Features to Consider

  Image New challenges and new opportunities have arisen due to big data, which is altering the nature of file transfer technology. The Good News Big data is leading to new file sharing technology, which is making it easier to solve certain big data file transfer problems. On the other hand, it is increasing the bandwidth...
Blog

Canadian Data Privacy Laws: An Overview

  Image Awareness and protections around how data containing private information is handled is ramping up across the globe, and Canada is no exception. Current data privacy laws in Canada include measures to protect individual privacy rights, transparency, access, and security. These laws are designed to give the public more control...
Blog

8 Reasons to Implement an MFT Security Solution

  Image Today’s businesses need to adhere to various security standards (e.g., PCI DSS, HIPAA, the GDPR) not only to prevent the high costs associated with data breaches, but also to avoid hefty penalties. Due to the large amount of data that organizations need to handle and protect, ensuring the security of data transferred among...
Blog

What is Drummond Certification?

  Image Drummond Certification: What is it? The Drummond Group is a third-party certification body that certifies software products and solutions to ensure a given solution does what it says it will. A security solution that goes through their extensive certification process earns the right to add the Drummond-certified distinction...
Blog

What is the Canadian Communication Security Establishment?

  Image What is the CSE? The CSE is one of Canada’s key security and intelligence organizations, specializing in cryptology. CSE stands for Communications Security Establishment or Centre de la sécurité des télécommunications. As a cybersecurity leader in Canada, it has three main duties: Collecting foreign signals intelligence,...
Blog

What Does Integration Buy You?

  Image   What Can Data Integration Buy You?   Data integration is the practice of consolidating data from a number of sources into a single, unified, and consistent source. This way of configuring data does an excellent job of meeting the needs of business processes and is a key component of any thriving data security structure....
Blog

How to Use MFT as a Workflow Automation Tool in Healthcare

  Image When it comes to managed file transfer (MFT) solutions, organizations across industries find them valuable for policy enforcement, user access control and authorization, risk reduction, and more. And when it comes to HIPAA and HITECH requirements, MFT shines as a secure workflow automation tool. MFT as a B2B Enabler What...
Blog

How Cloud Technology is Transforming the Healthcare Industry

  Image When you think of files in healthcare, you may think of illegible doctor notes, clipboards with unpronounceable drugs, or a hastily printed summary of your visit. The healthcare industry generates a lot of paperwork that makes its way into many hands, so how can healthcare organizations keep it flowing to the right places –...
Blog

5 Reasons to Consolidate Your File Transfer Processes with MFT

  Image There are many reasons organizations start using managed file transfer (MFT) solutions, but one of the most impactful is consolidation. MFT solutions are a great way to achieve and maintain data regulation compliance, automate new and ongoing file transfers, and gain greater insight into data movement and user access. ...
Blog

How GoAnywhere MFT Maximizes File Transfers for the Retail Industry

  Image   GoAnywhere MFT Secures Customer Data for the Retail Industry   Protecting customer data integrity is crucial for the retail industry. Data breaches are no joke, especially when a company’s reputation is on the line. There really is no room for error when highly sensitive credit card data and other personal information...
Blog

Avoid a PCI Breach; Avoid Costly Consequences

  Image Trending and making news headlines can be great for business, but not if the reason you’re making news is because of a PCI breach. Any organization that processes credit or debit card information is vulnerable, but any organization can also take steps to minimize their risks and the costly mitigation efforts that follow a...
Blog

What is Health Level Seven (HL7)?

  Image   What is HL7?   HL7, short for Health Level Seven, is a set of international Electronic Data Interchange (EDI) standards used to provide guidance with the transfer and sharing of clinical and administrative data between software applications used by various healthcare providers. These standards focus on the Application...
Blog

Can HIPAA-Certified Solutions Really Guarantee Compliance?

  Image When searching for a new software solution to meet your organization’s needs, it’s easy to see the labels “HIPAA-Certified” or “HIPAA Compliant” and believe your bases are covered. After all, “HIPAA-Certified” means the product or application follows HIPAA’s privacy rules and has everything in place to protect your health and...
Blog

How Azure Works with GoAnywhere MFT

  Image What is Azure? Microsoft Azure is a cloud computing platform comprised of more than 200 separate products and cloud services. Most organizations use Azure to host sites and applications in the cloud, or as part of a hybrid on-premises and cloud-based solution. Is Azure pronounced AH-zhur, AZH-urh, or a-ZHUR? You’ll hear it...
Blog

What is PeSIT?

  Image What is PeSIT? PeSIT, short for Protocol d'Echanges pour un Systeme Interbancaire de Telecompensation (Protocol for data Exchange within the French Systems for Interbank Tele-clearance), is an end-to-end open-source file transfer protocol that was developed in 1986 by the French Interbank Teleclearing Systems Economic...
Blog

Encryption for Exchanging Files

  Image You seal the envelope when you send a letter. You lock your car when you park at the big box store. You track your packages to make sure porch pirates don’t get them before you do. Your file exchanges should be no different. Learn the essentials on how you can keep your data secure both while it’s sitting at home or being...
Blog

What is FISMA?

  What is FISMA and How Does it Work? The Federal Information Security Management Act (FISMA) is a 2002 United States law that outlines steps and guidelines to follow to reduce security risks to federal data. FISMA applies to all U.S. federal agencies, some state agencies, and any private sector organizations that have a contract with the U.S. government. Additionally, both...
Blog

The 5 Biggest PCI Compliance Breaches

  Image The Payment Card Industry Data Security Standard (PCI DSS) is the main information security standard for organizations that process credit or debit card information must abide by. The guidelines established in PCI DSS cover how to secure data handling processes. While most organizations work to avoid PCI compliance breaches...
Blog

PCI Statistics That May Shock You

  Image   If your organization processes credit or debit card information, you’re probably already familiar with the Payment Card Industry Data Security Standard (PCI DSS), the regulatory standard enacted to prevent large data breaches like the ones you hear about frequently – the ones that make headlines for all the wrong reasons. ...
Blog

How to Comply with Brazil's Lei Geral de Proteção de Dados (LGPD)

  Image What is Brazil’s LGPD? LGPD stands for Lei Geral de Proteção de Dados (General Data Protection Law), which is a law streamlining what was previously 40 separate statutes protecting personal data in Brazil. Academic research and legislation around personal data and privacy has been an active priority in Brazil, culminating in...