Blog

Blog

How to Comply with Brazil's Lei Geral de Proteção de Dados (LGPD)

  What is Brazil’s LGPD? LGPD stands for Lei Geral de Proteção de Dados (General Data Protection Law), which is a law streamlining what was previously 40 separate statutes protecting personal data in Brazil. Academic research and legislation around personal data and privacy has been an active priority in Brazil, culminating in the overarching idea...
Blog

Give the Gift of Secure Folders, Secure Forms, and More

  If you’ve already given your IT team and organization the gift of managed file transfer (MFT) for secure, streamlined file transfers of your business-critical information, wow them further with modules. GoAnywhere modules, such as Secure Forms and Secure Folders, are like the bows on top of a present – they help tie up the loose ends of your file...
Blog

Compliance for Healthcare: Secure File Transfer Holds the Key

  Complying with your doctor’s recommendations is the primary key to feeling good and staying healthy. Complying with the healthcare industry’s security standards and personal data protection requirements holds the key to avoiding an audit failure, paying steep fines, or trying to heal from the impact of a data breach. Sure, you can meet stringent...
Blog

Why You Should Use Scheduled File Transfer Software

  Have you set up Amazon auto-deliveries? Installed a smart thermostat to keep your house the perfect temperature throughout the day? Approved auto-pay for your bills? Today’s world makes it easy to simplify nearly every aspect of your day-to-day – so why not schedule your file transfers? What is Scheduled File Transfer Software? More commonly called...
Blog

German DPAs Announce New Email Encryption Guidance

In May of 2020, substantial guidance on email encryption was issued by the German Data Protection Authorities (German DPAs) specific to personal data transferred via email. These guidelines recommend reducing the risks of a personal data breach with both end-to-end encryption and transport encryption. The new guidelines build on previous requirements,...
Blog

How to Help Ensure Compliance with Data Privacy Laws

  How to Help Ensure Compliance with Data Privacy Laws If complying with data privacy laws like the GDPR, PDPA, CPA, HIPAA, PCI DSS, PIPEDA, and more sometimes feels like swimming in alphabet soup, there is a life preserver that can simplify, secure, and automate the processes involved. Managed file transfer can proactively help organizations meet...
Blog

How GoAnywhere MFT Helps the Healthcare Industry Thrive

  GoAnywhere MFT is Just What the Doctor Ordered The healthcare industry is a complex system full of regulations to comply with and highly sensitive data to move from one location to the next. From dramatic cost cutting, to eliminating manual processes, to strengthening data encryption and more, GoAnywhere Managed File Transfer (MFT) is just what the...
Blog

GDPR and Data Privacy after Brexit: What’s Next?

  So, the GDPR (General Data Protection Regulation) hit us with a bang in May 2018 and aside from a few high-profile fines, companies seem to be coping well on the whole. But is that really what’s happening or is it like an elegant swan, calm above water but flapping around underneath? It is safe to say that by now companies and employees are very...
Blog

How Are Your Peers Utilizing Automation in GoAnywhere?

    The Uses are Endless It’s no secret that automation is a great way to boost your business. It can save time, money, and important resources. But how is it being used by your peers on a day-to-day basis? Read on for some examples straight from your peers’ own personal experiences automating their file transfer processes. Adams County, Colorado ...
Blog

Is Automation All It’s Cracked Up to Be?

  Automation is Key We’ve all had our moments of being skeptical when something sounds too good to be true. However, automation is no joking matter. Automation is a great way to boost your business by saving time, money, and important resources.       What is Automation? Automation is the use of electronics and/or computer-controlled...
Blog

Real-Life Ways GoAnywhere Saves Your Peers Time, Money, and Resources

  It’s Time to Get Real Let’s be real – time, money, and resources are all equally valuable in the business world. If you’re looking for a solution that can help you substantially save all three in your everyday life, look no further than GoAnywhere. Time After Time Time after time, GoAnywhere can help you maximize the time you have and keep wasted...
Blog

PDPA in Singapore Helps Protect Personal Data

  What is the PDPA of 2012? The Personal Data Protection Act of 2012 (PDPA) is a law designed to regulate and enforce the proper collection, use, disclosure, and care of the personal data of citizens in the Republic of Singapore. The Personal Data Protection Commission (PDPC) is charged with establishing policies and for reviewing organizational...
Blog

What is Operation Yellowhammer and How Does it Affect Data Transfers?

    What is Operation Yellowhammer?   If you are located in the United Kingdom (UK), then you may already be familiar with Operation Yellowhammer and its relationship to Brexit and the European Union (EU). For those of you that haven’t been briefed on Operation Yellowhammer and how it relates to Brexit, now is the perfect time to learn how this...
Blog

GDPR: Understanding the 8 Rights of Data Subjects

Find out what these new rights mean for your organization and how you can prepare.   GDPR (General Data Protection Regulation) is the EU’s new legal framework that replaced the EU Data Protection Directive in May 2018. While the directive was merely a recommendation, GDPR carries the force of law. The purpose of GDPR is similar to...
Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

    Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020 Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll want to pay close...
Blog

Automation Operations: 5 Benefits of Automation

    Advantages of Automation Visions of a mechanized world flourished long before the term "automation" was coined. The star of Westinghouse’s exhibit at the 1939 World’s Fair was Electro, a robot that could walk, talk, and count on its fingers. Sadly, Electro and his kind were little more than demonstrations of remote control by human operators...
Blog

Everything You Need to Know about FTP Automation Software

  So, you want to automate your FTP file transfers. Whether you send a dozen file transfers a week, hundreds a day, or even more, automation is a smart step for most businesses. The benefits are simple: automatic file transfers cut down on user errors, reduce or eliminate the need for scripts, free up manual time spent on creating and maintaining jobs,...
Blog

Public Defender’s Office Reduces Manual Data Entry with Secure File Transfer Software

  Every organization has legacy processes. Manual data entry, file cabinets full of paper records, sensitive documents sent across the organization by email, or even file transfers sent via homegrown scripts or FTP—all these processes can cause more headaches than their worth. Unfortunately, implementing a new strategy to replace a legacy one isn’t...
Blog

10 Ways to Achieve Automatic File Transfers with GoAnywhere MFT

  Here’s a fun fact: When it comes to streamlining file transfer processes, secure FTP automation software is the supporting sidekick to any IT or cybersecurity professional. Like Robin supports Batman and Hawkeye supports Marvel’s Avengers, automatic file transfer software can support your pursuit for top notch cybersecurity, compliance, and...
Blog

IT Pros in Healthcare: How to Choose a Secure File Transfer Solution

  Every healthcare provider wants to avoid being the next data breach headline—and unfortunately, we have seen many incidents and their consequences in 2018 so far. The causes of these data breaches range from wrongly configured databases to successful malware attacks and unauthorized user access. For those looking to avoid the pain, embarrassment,...