Blog

Blog

Which is Better: Free SFTP Software vs. Enterprise-Level SFTP Software?

Free SFTP Software vs. Enterprise-Level SFTP Solutions In general, people like free things. Beverages, company lunches, swag at tradeshows and conferences, t-shirts and socks, those intriguing items in the “For Free” box at your local yard sale… You can’t go wrong with free, right? Well, coffee you don’t have to pay for is great, but the adage “There’s no such thing as a free...
Blog

What is Secure File Transfer?

  Image Moving sensitive, often-proprietary files from one person—or organization—to another has become a complex aspect of the business world today. This complexity comes not only from the size and number of files that need to be shared, but also from the need to protect them at all points during their journey from sender to...
Blog

Why You Should Incorporate Managed File Transfer into Your Cybersecurity Strategy

  Image Managed File Transfer: A New Cybersecurity Strategy for Sensitive Files Earlier this month, independent news platform Patch reported that Neiman Marcus, a department store chain in the US, has finally agreed to a settlement for their 2014 data breach. They’ll need to "pay $1.5 million and adopt measures to prevent hacks,"...
Blog

Data Breach and Incident Response Plans | 2019 Templates & Best Practices

  Image Every year, organizations hope that statistics for data breaches will improve, that things will be better than the year before. And every year, they are dismayed to discover that even though they’re pulling in new cybersecurity tactics to thwart cyber attacks, so are hackers pulling in new methods to discover their...
Blog

What is FTPS?

  Image Whether you’re looking to upgrade from your current FTP file transfers or have new requirements from a trading partner or customer, you might be wondering what FTPS is. You may ask: how does FTPS work, and does it differ from secure file transfer protocols like SFTP and AS2? Good questions. Let’s start by defining what FTPS...
Blog

Which is Better: SFTP vs. MFT?

  Image SFTP, or MFT: that is the question. Even though we’re not all famous poets like William Shakespeare, many IT professionals will ask this question at some point or another. Should they use an SFTP or managed file transfer (MFT) solution to transfer sensitive files securely—and why? It brings up an interesting choice. By...
Blog

The Best Cybersecurity Strategies for Banks and Financial Organizations

  Image Banks and financial institutions, take note: though the year is almost over, no one is safe from a data breach. Industries across the board have seen 4.5 million records stolen so far in 2018—a staggering 133% increase over those compromised in 2017. As you create updated cybersecurity plans and data breach prevention...
Blog

Why You Should Cluster Your File Transfer Systems

  Image What’s the true cost of downtime for your organization? You may think of it in terms of lost revenue—according to studies released in the last couple years, the average cost of system-wide downtime is $100,000 an hour, and that’s on the low end (it can get up to $300,000 or more). But there are other factors involved in the...
Blog

Which is Better: SFTP vs. FTPS?

  Image How do you transfer sensitive files? Business requirements and security standards have increased in recent years across industries and continents, but many organizations have struggled to keep up. Manual scripts, legacy tools, and single-use software are still utilized by IT and security teams despite their risks, causing...
Blog

SFTP: The Smart Way to Transfer Your Cloud Data

  Image With the growing buzz about everything "cloud computing," most organizations are either starting to consider the cloud or have already moved some of their business processes to a cloud platform. No matter where you stand, technology is no stranger to the cloud. Consumers use cloud applications, services, and storage daily,...
Blog

10 Essential Tips for Securing FTP and SFTP Servers

  Image Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers, putting your FTP or SFTP server at risk of a costly data breach. Bob Luebbe, GoAnywhere Chief Architect at Fortra, hosted a...
Blog

Is Your Data REALLY Safe on the IBM i (AS/400)?

  Image “AS/400 is built to be safe and reliable.” “No one makes viruses for the IBM i. There are no known cases of malware, either.” “IBM has amazing IBM i server security, so we don’t have to worry about vulnerabilities.” Do these statements sound familiar? Perhaps you’ve come across these claims in the industry, heard someone...
Blog

Managed File Transfer: It's More than SFTP

  Image For many, MFT and SFTP are a package deal. You can’t seem to have a managed file transfer solution without relying on an SFTP server to secure your file transfers. But this leaves a lot of people wondering—is managed file transfer only useful for SFTP file transfer automation? The reality is, MFT is far more than just an...
Blog

5 Ways to Protect Your Financial Organization from a Data Breach

  Image While several industries, including business and education, make up a big portion of yearly data breach counts, banks and credit unions aren’t left risk free. According to the Identity Theft Resource Center (ITRC), the banking/credit/financial sector totals 5.8% of 2017’s data breaches as of June 30, 2017. That’s up two...
Blog

Are SSH Keys or Passwords Better for SFTP Authentication?

Image SFTP passwords or SSH keys? That’s the question often asked by IT professionals when setting up authentication on an SFTP server. There’s some debate on whether SSH keys or passwords are better at protecting and validating company SFTP servers, and the consensus is never official. Questioning what the best SFTP security best...
Blog

Data Breach and Incident Response Plans | 2017 Templates & Resources

Image As we continue to put our data online, through social media channels, cloud storage, and email attachments, we open ourselves up to the possibility of data breaches and other attacks. The answer to this problem isn’t to stop using the internet, of course. But organizations today need to pay serious attention to their...
Blog

WinSCP Free SFTP Client or an MFT SFTP Client?

  Image If you’re looking for a SFTP client to use for your organization’s file transfers, it might be tempting to go with one that’s free—and bonus points if it’s open source. Often enough, these SFTP clients meet the minimum requirements for most network administrators, they’re easy to install (without taking up much space on your...
Blog

EFSS vs. MFT: What's the Difference?

  Image EFSS (Enterprise File Sync and Share) and MFT (Managed File Transfer) are two terms that are frequently thrown around in the IT industry. Each solution is used to transfer files to multiple locations and devices, and they can both be deployed on-premises or in a cloud environment. These similarities inspire frequent...
Blog

Are Your Electronic Health Records (EHRs) Secure?

  Image Since moving to Electronic Health Records and modern EHR technology, the healthcare industry has taken great strides to enhance patient care, internal workflows, and business-to-business communication. These improvements bring organizations closer and closer to full integration with others in the industry; a goal that will,...
Blog

Two Cybersecurity Takeaways from the Equifax Data Breach

  Image It’s been nearly a week since Equifax went public with knowledge of a massive data breach—perhaps one of the biggest to date. There’s no word yet on who is or isn’t affected, but it’s very likely that 143 million Americans (45% of the U.S. population and 80% of those who have a credit report) are now at risk of identity theft...