Blog

Blog

How to Help Ensure Compliance with Data Privacy Laws

  How to Help Ensure Compliance with Data Privacy Laws If complying with data privacy laws like the GDPR, PDPA, CPA, HIPAA, PCI DSS, PIPEDA, and more sometimes feels like swimming in alphabet soup, there is a life preserver that can simplify, secure, and automate the processes involved. Managed file transfer can proactively help organizations meet...
Blog

How GoAnywhere MFT Helps the Healthcare Industry Thrive

  GoAnywhere MFT is Just What the Doctor Ordered The healthcare industry is a complex system full of regulations to comply with and highly sensitive data to move from one location to the next. From dramatic cost cutting, to eliminating manual processes, to strengthening data encryption and more, GoAnywhere Managed File Transfer (MFT) is just what the...
Blog

Open PGP and GoAnywhere MFT: What You Need to Know

        Which Solution is Right for You? Open PGP vs. GoAnywhere MFT If you have sensitive files that need to get from point A to Point B securely, you may have considered utilizing Open PGP or a managed file transfer solution, like GoAnywhere MFT. Do you know which option is the best fit for your organization? What is Open PGP? Open PGP is an...
Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

    Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020 Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll want to pay close...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

  If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want it to include a key...
Blog

IT Pros in Healthcare: How to Choose a Secure File Transfer Solution

  Every healthcare provider wants to avoid being the next data breach headline—and unfortunately, we have seen many incidents and their consequences in 2018 so far. The causes of these data breaches range from wrongly configured databases to successful malware attacks and unauthorized user access. For those looking to avoid the pain, embarrassment,...
Blog

2018 Cybersecurity Concerns in Healthcare and How to Address Them

The first few weeks of January always seem to be accompanied by an influx of new cybersecurity trends, forecasts, and concerns. As expected, 2018 has followed this pattern—and with the need for secure patient information growing ever more critical and the arrival of GDPR in May, it’s no surprise that healthcare experts are deep in conversation about...
Blog

Are Your Electronic Health Records (EHRs) Secure?

  Since moving to Electronic Health Records and modern EHR technology, the healthcare industry has taken great strides to enhance patient care, internal workflows, and business-to-business communication. These improvements bring organizations closer and closer to full integration with others in the industry; a goal that will, once fully achieved, help...
Blog

8 Ways to Protect Your Healthcare Organization from a Data Breach

In 2020, there were 642 data breaches of healthcare organizations. That’s a new record, up 25 percent from the previous year. In these breaches, the records of millions of Americans were exposed. These incidents occurred at all types of organizations in the industry, including clinics, insurance providers and their health system business associates.   If you’re in the healthcare industry...
Blog

HIPAA Compliance: Guide Details How MFT Helps

  Are your file transfers HIPAA compliant? Is your healthcare organization at risk for fines, or worse - a data breach of sensitive patient information? Many healthcare IT teams meet these broad questions with unease. After all, the ramifications of a healthcare data breach can impact organizations and individuals for years to come as well as have a...
Blog

Why Healthcare Organizations Need a Secure Data Transfer Solution

The last few years were scary in terms of healthcare cybersecurity. A hack of Banner Health breached up to 3.7 million records. Another data breach at 21st Century Oncology resulted in multiple lawsuits being filed against the organization. When a third party gained unauthorized access to computer systems at Valley Anesthesiology and Pain Consultants, almost 900 thousand patients, employees, and...
Blog

OpenPGP, PGP, and GPG: What is the Difference?

  The privacy capabilities of encryption methods such as Pretty Good Privacy (PGP) allow organizations to achieve a hightened amount of data security and protection. There are various approaches and elements of comparison for these encryption methods, however, and each one comes with their own histories, features, and capabilities. These are: PGP,...
Blog

How to Build a Framework for HIPAA and HITECH Compliance

  HIPAA, established in 1996, was signed into law to outline the appropriate ways to use and disclose patient health information. Read on to learn how to develop a HIPAA- and HITECH-compliant IT framework for your organization.   Why Does HITECH Exist? HITECH laws were enacted to up the ante on healthcare organizations to meet HIPAA legal compliance...
Blog

Addressing HIPAA and HITECH Compliance Challenges

  HIPAA and HITECH regulations were designed and enacted to increase the security surrounding personal health information from those who should not have access to it. Next to finance, the healthcare industry is one of the most regulated industries around. While debates on the cost, structure, and delivery of healthcare continues, most people agree that...
Blog

Meeting Compliance Regulations and Privacy Laws for Sensitive Data Transfers

  Comply with Data Security Requirements Highly sensitive data is exchanged between organizations on a constant basis making data security compliance more vital than ever to keep communication flowing. For instance, if a business routinely transmits financial information to their bank including payroll direct deposits and ACH payments, these...