Blog

Blog

What is Ransomware and How to Detect and Prevent It

What is Ransomware? Let’s start with the basics. The simple definition of ransom is “a consideration paid or demanded for the release of someone or something from captivity.” Ransomware, then, is a way for bad actors to encrypt information and hold it ransom in exchange for money—typically untraceable bitcoin. There are four main ways that hackers target organizations and demand payment: Lockout...
Blog

Ship to Shore Fast File Transfer: 3 Offshore Fleet Communication Case Studies

Data transfer has hurdles for any industry, but remote file transfer from ship to shore must overcome additional obstacles. Even as data collection tools become more powerful and generate bigger datasets than ever before, transfer tools have improved at a slower pace, and are not often built with mid-ocean data transfer in mind. Discover how three organizations avoided this common pitfall with...
Blog

Why it’s Time to Adopt Zero Trust Architecture

If you work in cybersecurity, the chances are that you will have come across the phrase Zero Trust over the past few years. It’s become a real industry buzzword, but there is substance behind the noise on this occasion. To the outsider, it’s a term that is easy to misinterpret. It sounds draconian and severe and could be perceived as meaning the organization trusts no one when it comes to...
Blog

End-to-End Rights Management Made Simple with SFT

Digital files are the crown jewels of any organization, and end-to-end rights management is increasingly the goal of businesses who need to transfer files securely. How can organizations ensure data is secure from inception to publication, especially when third parties enter the picture? Enter secure file transfer plus digital rights management. These two tools together help organizations keep a...
Blog

A Ransomware Special - WannaCry’s Anniversary and More: This Month in Cybersecurity

May’s ‘this month in cybersecurity ’ is somewhat of a ransomware news special. In addition to a ransomware attack on Costa Rica and the continued expansion of BlackByte, this month also marks the fifth anniversary of WannaCry, perhaps the most damaging malware attack the world has seen. Ransomware remains hugely prevalent, but is an attack likely to happen again on this scale? And if it did, how...
Blog

NAB Show Recap: The Power of Fast File Transfer in Media and Broadcast

Global Visionaries Converged at the 2022 NAB Show The recent annual NAB Show was, as usual, a fantastic event to get a bead on industry happenings and meet the movers and shakers pushing our notions of what’s possible. The event attracts media, entertainment, and technology companies looking level up the process of creating and distributing content for global audiences. NAB announced that this...
Blog

What is Ryuk Ransomware?

The last few years have seen a rise in stories about Ryuk, a powerful piece of ransomware that is best known for targeting healthcare institutions , but has also been attacking municipal governments, state courts, enterprises, and large universities, among others. Many of these organizations have paid hefty fees – between $100,00 and $500,000, payable in Bitcoin – to recover their files following...
Blog

Secure File Transfer Drives Compliance and Efficiency for Credit Unions

The unwavering protection of personally identifiable information (PII) is the foundation upon which financial and banking organizations build their services and instill trust in customers. Achieving this requires credit unions and related companies to navigate a fine balance between stringent data security and business efficiency to meet customer needs and evolving compliance requirements...
Blog

This Month in Cybersecurity: Time for a Spring Clean?

Spring is the time of year when people start thinking about decluttering, cleaning, and readying themselves for the next season—spring cleaning. It's a tradition that dates back centuries, but it could also be applied to an organization's cybersecurity. There’s never a bad time to reflect on how best to keep your organization safe, especially given that there seems to have been no shortage of...
Blog

Is Your Disaster Recovery Site Ready?

The old adage, "It's not a matter of if, but when" can strike fear in the heart of every IT professional, especially when talking about recovering form the unexpected impact of outages. Whether the result of a natural disaster, cybercrime impact, or large-scale network outages that dreaded downtime and the security measures that need to be taken around it must be planned for. Most organizations...
Blog

How GoAnywhere MFT Works with SharePoint

Data and documents are the lifeblood of the business and sharing that data to both external trading partners and internal stakeholders is essential. Discover how GoAnywhere works with one of today’s favorite intranet sites for teams and file sharing: SharePoint. What is SharePoint? SharePoint helps teams meet various business needs by providing centralized, secure locations to communicate, share...
Blog

How Fast File Transfer Helps Natural Resources Companies

Moving data from the field to the office often runs into speedbumps like slow connections, dropped packets, or even failed backups. In the energy and natural resources industries , moving data is even more difficult due to the size and complexity of data collected on-site. What can organizations do to send big data reliably – and quickly? One answer is to use a fast file transfer solution. What is...
Blog

How to Streamline Secure Data Exchanges

Secure Data Exchanges Don't Have to Sacrifice Efficiency Hitting “send” is as routine and frequent as sipping on coffee for many employees. And uploading a file to a third-party, vendor, or another colleague happens with that same automatic mind-set. Outside of the IT team, many employees don’t actually give a lot of thought to the journey of the data they are sending out. The value of the data...
Blog

Comparing the Top File Transfer Protocols

With dozens of file transfer protocols to choose from, how do you know which is the best for your business? Some file transfer protocol specifications are set by trading partners – method, format, and security requirements – while others are set by internal requirements. Discover the top secure file transfer methods, and how they stack up against one another in this blog. Your Comprehensive File...
Blog

HIPAA vs. HITRUST: The Key Differences

What is HIPAA? HIPPA, or the Health Insurance Portability and Accountability Act, is a federal law that addresses regulatory compliance for healthcare organizations. HIPAA sets the standard for protecting sensitive patient data and applies to any company that deals with protected health information (PHI). HIPAA requires healthcare organizations and their business associates to implement...
Blog

Choosing MFT Software Based on User Reviews

Humans use reviews for pretty much everything – hiring a company, making a purchase, even applying for a job. Reviews give us insight into what someone – presumably someone like us, if they’re currently using the same thing we’re shopping for – thinks of a product: how they liked it, what their experience is, and what could have been better. Even feats of human ingenuity have reviews: the Great...
Blog

Data Security Measures for the Return to Office

Whether your employees are headed back to the office enthusiastically, with a bit of dread, or a mix of emotions, they’ll bring with them more than just their laptops, lunches, and stories from their work-from-home days upon their return. They’ll also potentially be bringing along some data security risks. While risks around unauthorized file sharing, virus prevention, and more, might be similar...
Blog

5 Ways Government Can Improve Cybersecurity Resilience

Cybersecurity for Government is Crucial In these trying times government agencies everywhere must be resilient when it comes to cybersecurity. Cyber resilience is an organization’s ability to prepare for, respond to, and recover from cyber threats. A cyber-resilient organization can adequately adapt to known and unknown crises, threats, adversities, and challenges. Resiliency is an absolute...
Blog

What is India's Personal Data Protection Bill?

The EU’s GDPR paved the way for data privacy and protection laws around the world, and one of the latest is the emerging Personal Data Protection Bill in India. While organizations in India already adhere to international data privacy laws, including GDPR when serving overseas customers, as well as the restrictions set out in 2000’s Information Technology Act , neither directly and specifically...
Blog

Secure File Transfer for Supply Chain Risk Management

Supply chain attacks are one of the fastest-growing cyber risks that organizations face in 2022, and when it comes to supply chain risk management, organizations in every industry should pay attention. There have always been efforts to help organizations understand and mitigate risks related to supply chain, and recent initiatives, including the U.S.’s Executive Order on Improving the Nation’s...