Blog

Blog

Secure File Sharing for Banks Gets a Boost from GoAnywhere MFT

Image Secure file sharing for banks has always been of utmost importance and is only gaining traction in the face of common cybersecurity threats and compliance requirements alike. Requirements like PCI DSS, GDPR, GLBA, and more can make processes more complicated, even as the safeguards outlined within them promote data security to...
Blog

Why it’s Time to Adopt Zero Trust Architecture

  Image   If you work in cybersecurity, the chances are that you will have come across the phrase Zero Trust over the past few years. It’s become a real industry buzzword, but there is substance behind the noise on this occasion.   To the outsider, it’s a term that is easy to misinterpret. It sounds draconian and severe and could...
Blog

Secure File Transfer Drives Compliance and Efficiency for Credit Unions

  Image The unwavering protection of personally identifiable information (PII) is the foundation upon which financial and banking organizations build their services and instill trust in customers. Achieving this requires credit unions and related companies to navigate a fine balance between stringent data security and business...
Blog

Comparing the Top File Transfer Protocols

  Image With dozens of file transfer protocols to choose from, how do you know which is the best for your business? Some file transfer protocol specifications are set by trading partners – method, format, and security requirements – while others are set by internal requirements. Discover the top secure file transfer methods, and how...
Blog

What is India's Personal Data Protection Bill?

  Image The EU’s GDPR paved the way for data privacy and protection laws around the world, and one of the latest is the emerging Personal Data Protection Bill in India. While organizations in India already adhere to international data privacy laws, including GDPR when serving overseas customers, as well as the restrictions set out in...
Blog

Secure File Transfer for Supply Chain Risk Management

  Image Supply chain attacks are one of the fastest-growing cyber risks that organizations face in 2022, and when it comes to supply chain risk management, organizations in every industry should pay attention. There have always been efforts to help organizations understand and mitigate risks related to supply chain, and recent...
Blog

What is HITRUST Compliance?

  Image HITRUST Compliance Helps to Manage Risk The secure storage and transfer of sensitive data is of the utmost importance to the healthcare industry. Data security and complying with the Health Insurance Portability and Accountability Act (HIPAA) is paramount, yet doing so can often be complex and difficult to maintain. This is...
Blog

What is a PGP File?

  Image What is PGP and What is It Used For? PGP is short for Pretty Good Privacy and it’s one of the most widely used technologies for encrypting and authenticating files. It can help encrypt, decrypt, authenticate, and verity various file types including emails, files, directories, disk partitions, and more. PGP, along with its...
Blog

Cybersecurity Concerns in Healthcare in 2022

  Image Every year the healthcare industry is greeted with headlines stating that ‘last year was the most-breached ever.’ And that trend is unlikely to stop in 2022. The healthcare industry has historically been one of the most-targeted by hackers, and one of the most breached by internal actors. Key reasons why include vast amounts...
Blog

13 Essential MFT Blog Posts You Might Have Missed

  Image There’s a lot out there (and just on this website) about what MFT (managed file transfer) software is, why it’s a good FTP alternative, and how to choose the best file transfer software for your business. That’s why we’ve selected 13 of our top blogs that answer those exactly those questions – and more. And because questions...
Blog

Looking to 2022: New Year, New Data Security Strategies

  Image 3 Data Centric Security Strategies for 2022 Despite massive growth in data security spending, the number of data breaches is increasing. With constant changes in how and where work is done—thanks in part to growth in both cloud computing and mobile device usage—the threats are changing, too. And so are the strategies taken...
Blog

What is SOC 2 and Why it Matters for Security

  Image There are some things in life that should be a given: rollercoasters are inspected regularly, chefs wash their hands, and your organization’s file transfers are secure. That last is a little more nebulous to see immediate cause-and-effect (it’s not like your rollercoaster car rolling off the tracks or getting food poisoning!...
Blog

The Difference Between Data Privacy, Data Protection, and Compliance

  Image Data privacy, data protection, and compliance: they’re similar, but not the same. If you’re like most IT professionals, you may have used these terms interchangeably, and with good reason: all data privacy laws deal with protection, many data protection laws have privacy at their heart, and both outline compliance...
Blog

The Surprising Relationship Between Data Privacy Laws and File Sharing

  Image Location, location, location. Not just the mantra of realtors and would-be buyers – it’s also a concern for data security professionals world-wide. As cloud computing has ramped up across industries, the physical location of stored data has been called into question, alongside concerns stemming from data privacy laws. Read...
Blog

What’s the Number One Enterprise MFT Solution?

  Image Enterprise operations make critical decisions daily with an impact often felt around the world. One of those choices: selecting the right enterprise managed file transfer (MFT) solution to ensure all the data exchanged daily both internally and externally is secure and the exchange process is automated to maximize...
Blog

How Managed File Transfer Supports SWIFT Compliance

  Image Any organization that handles sensitive financial data knows that secure transfers are essential to data security. Discover how a secure file transfer solution can support and enhance your SWIFT usage. What is SWIFT? SWIFT, short for Society for Worldwide Interbank Financial Telecommunications, is a leading secure messaging...
Blog

GDPR and its Relationship with Healthcare

  Image   What is GDPR?   The General Data Protection Regulation (GDPR) establishes protections for the privacy and security of sensitive data for individuals in the European Union (EU). The data protection regulation was designed to harmonize data privacy laws throughout the EU and replaced the long-standing Data Protection...
Blog

Who is Protecting Your Healthcare Records?

  Image Patient Privacy is in Jeopardy: Data Breaches, High Payouts, and PHI How important is a patient's privacy? If your organization is a healthcare facility, the instinctive answer that comes to mind is "Very important!" After all, a patient's privacy is the basis upon which a doctor/patient relationship is based. Right? When...
Blog

Why Banking Growth in Latin America Correlates with Cybercrime

  Image   Bancarization is Exploding in Latin America Latin America is the fastest-growing banking market worldwide, and growth is only expected to continue. Forecasts are anticipating 10 percent increases across all Latin American banking sectors through 2022. Bancarization refers to both the amount of access and the degree of...
Blog

How to Meet Biden’s Executive Order on Cybersecurity Requirements

  Image On May 12, 2021, President Biden issued an executive order designed to improve the nation’s cybersecurity and to better protect federal government networks. The Executive Order on Improving the Nation’s Cybersecurity calls for stronger and more layered data security as part of a focus on data-centric security architecture...