Blog

Blog

What are the Secure Messaging Standards in Australia?

  Image Secure Messaging in Healthcare Healthcare is essential to live a healthy life, but it shouldn’t come at the expense of your privacy. Healthcare is an industry that will always be growing, which means that if your situation transitions to a place where you need to see a new doctor or a specialist, your very private and...
Blog

What is the California Consumer Privacy Act?

  Image The California Consumer Privacy Act (CCPA), the latest data privacy law in the Golden State, went into effect on January 1st, 2020. Some have compared it to the UK’s GDPR (General Data Protection Regulation), and they’re not far off – like the GDPR, the CCPA is intended to protect individuals’ private data by making data...
Blog

How Are Your Peers Utilizing Automation in GoAnywhere?

  Image   The Uses are Endless It’s no secret that automation is a great way to boost your business. It can save time, money, and important resources. But how is it being used by your peers on a day-to-day basis? Read on for some examples straight from your peers’ own personal experiences automating their file transfer processes. ...
Blog

Is Automation All It’s Cracked Up to Be?

  Image Automation is Key We’ve all had our moments of being skeptical when something sounds too good to be true. However, automation is no joking matter. Automation is a great way to boost your business by saving time, money, and important resources.       What is Automation? Automation is the use of electronics and/or...
Blog

What is PIPEDA?

  Image PIPEDA, the Personal Information Protection and Electronic Documents Act, is a privacy law that applies to private-sector organizations and businesses throughout Canada. The goal of PIPEDA is to ensure that all provinces and territories protect personal data. This includes: Asking for and obtaining consent when an...
Blog

How Banks are Benefiting from MFT Integration

  Image Trying to integrate and tie diverse internal and external banking applications, branches, systems and trading partners together so they work seamlessly with internal and central banking applications can have your IT department constantly untangling complex knots to ensure transactions and information flows easily. There is a...
Blog

Real-Life Ways GoAnywhere Saves Your Peers Time, Money, and Resources

  Image It’s Time to Get Real Let’s be real – time, money, and resources are all equally valuable in the business world. If you’re looking for a solution that can help you substantially save all three in your everyday life, look no further than GoAnywhere. Time After Time Time after time, GoAnywhere can help you maximize the time...
Blog

PDPA in Singapore Helps Protect Personal Data

  Image What is the PDPA of 2012? The Personal Data Protection Act of 2012 (PDPA) is a law designed to regulate and enforce the proper collection, use, disclosure, and care of the personal data of citizens in the Republic of Singapore. The Personal Data Protection Commission (PDPC) is charged with establishing policies and for...
Blog

7 Essential Resources on PCI DSS Security

  Image Note from the Editor: This article was originally published in February 2017. It has been updated with resources current to PCI DSS version 3.2.1. Did you know that 80% of organizations are not compliant with PCI DSS requirements? That means, if you’re reading this, there’s a pretty good chance your company needs to...
Blog

Meeting IT Security and Compliance Requirements with GoAnywhere MFT

  Image Meet your IT and compliance requirements easily with GoAnywhere MFT. GoAnywhere helps organizations and IT professionals comply with an array of strict regulations, methods, and technologies. To open a larger, clickable image, choose the "Download" option below. DOWNLOAD   Image ...
Blog

GDPR: Understanding the 8 Rights of Data Subjects

Image Find out what these new rights mean for your organization and how you can prepare.   GDPR (General Data Protection Regulation) is the EU’s new legal framework that replaced the EU Data Protection Directive in May 2018. While the directive was merely a recommendation, GDPR carries the force of law. The purpose...
Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

  Image   Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020 Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll...
Blog

I’ve Just Been Breached, Now What?

  Image So, you think (or perhaps you know) you’ve been breached. It’s every organization’s nightmare, and you’re living it, facing local and federal fines, upset customers, public panic, and a loss of intellectual property. A breach can be a harrowing ordeal; if you’re not sure what to do immediately after discovering the breach,...
Blog

Automation Operations: 5 Benefits of Automation

  Image   Advantages of Automation Visions of a mechanized world flourished long before the term "automation" was coined. The star of Westinghouse’s exhibit at the 1939 World’s Fair was Electro, a robot that could walk, talk, and count on its fingers. Sadly, Electro and his kind were little more than demonstrations of remote...
Blog

Everything You Need to Know about FTP Automation Software

  Image So, you want to automate your FTP file transfers. Whether you send a dozen file transfers a week, hundreds a day, or even more, automation is a smart step for most businesses. The benefits are simple: automatic file transfers cut down on user errors, reduce or eliminate the need for scripts, free up manual time spent on...
Blog

Public Defender’s Office Reduces Manual Data Entry with Secure File Transfer Software

  Image Every organization has legacy processes. Manual data entry, file cabinets full of paper records, sensitive documents sent across the organization by email, or even file transfers sent via homegrown scripts or FTP—all these processes can cause more headaches than their worth. Unfortunately, implementing a new strategy to...
Blog

10 Ways to Achieve Automatic File Transfers with GoAnywhere MFT

  Image Here’s a fun fact: When it comes to streamlining file transfer processes, secure FTP automation software is the supporting sidekick to any IT or cybersecurity professional. Like Robin supports Batman and Hawkeye supports Marvel’s Avengers, automatic file transfer software can support your pursuit for top notch cybersecurity,...
Blog

How 3 Financial Institutions Solve File Transfer Needs with MFT Software

  Image On a scale of 1-10, how would you rate the efficiency of your file transfers right now? If you use manual scripts, legacy software, or a myriad of free tools to balance your encryption, automation, cybersecurity, reporting, and collaboration needs, it’s possible you’ll rate your efficiency low on the scale. After all,...
Blog

IT Pros in Healthcare: How to Choose a Secure File Transfer Solution

  Image Every healthcare provider wants to avoid being the next data breach headline—and unfortunately, we have seen many incidents and their consequences in 2018 so far. The causes of these data breaches range from wrongly configured databases to successful malware attacks and unauthorized user access. For those looking to avoid...
Blog

Understanding the GDPR (General Data Protection Regulation)

Image Note from the Editor: This is an older resource on GDPR. For more on the latest GDPR resources, check out our GDPR resource page. Table of Contents Introduction What is the GDPR? GDPR and the Data Protection Directive 2018: The Year of GDPR GDPR and Brexit GDPR Fines and Penalties How to...