Blog
PCI DSS 4.0 - What to Expect, What's Coming, How to Comply
By Heath Kath on Tue, 08/30/2022
Image
Get ready for more stringent PCI DSS compliance requirements. The PCI Security Standards Council (PCI SSC) updated its version 4.0 requirements in March 2022, in large part to address increasingly sophisticated cybercriminal threats. Rapidly growing contactless and cloud-based card usage also helped nudge an update to PCI DSS...
Blog
Are SSH and SFTP the Same?
By Heath Kath on Sun, 08/28/2022
Image
Are SSH and SFTP the Same?
SSH and SFTP are a classic pair. They intertwine when it comes to securing communication, and while they have similar capabilities, they are not the same thing. So, what’s the difference between them? Read on to find out.
What is SSH?
Secure Shell (SSH) is a transport layer that is used...
Case Study
Meliá Hotels International Gains File Transfer Stability and Confidence with GoAnywhere MFT
Adding GoAnywhere MFT to their IT environment for secure file transfers was the remedy Melia needed. GoAnywhere allowed Meliá Hotels International to integrate these third-party exchanges into the same tool as the rest of their transfers, without making any protocol changes, and with added security through its built-in SFTP and Secure Forms capabilities.
Guide
How to Comply with PCI Data Security Standards
If you work for any organization that processes credit or debit cards, then you must achieve and maintain PCI DSS compliance. The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that process credit or debit cards. The standard is a moving target as it is frequently updated to address new security threats or...
Guide
PCI DSS Compliance with Managed File Transfer
Leading edge IT shops are rethinking the use of underlying components within their data transfer arsenals, and are arming themselves to comply with ever changing compliance requirements, including PCI DSS.
Download the white paper to examine how a Managed File Transfer (MFT) solution can help your company stay ahead of PCI compliance requirements with data transfers. This PCI...
Guide
Beyond FTP: Securing and Managing File Transfers
FTP made its first appearance in 1971, and it hasn’t changed much over the years. Although it has become the standard for business-to-business file transfers, poor FTP implementation practices have left many businesses with severe security and management issues.
There’s a better way. Download the white paper to learn how to bring your FTP implementation into a more modern,...
Blog
This Month in Cybersecurity: The Weather is Heating Up and So Are Cyberattacks
By Heath Kath on Thu, 08/04/2022
Image
At the time of writing, much of Europe and the U.S. is in the midst of a major heatwave, delivering record temperatures and concerns about climate change. Just as the heat is rising, so is the threat of cyberattacks.
New data has emerged that reveals 2022 is looking like it could be the worst year ever for cybersecurity in...
Blog
4 Ways You Can Use Your Digital Rights Management Tool
Tue, 08/02/2022
Image
In an increasingly collaborative work environment, it’s more important now than ever before that your organization has the highest level of visibility and control possible over its data. While knowing how to choose the right data security solutions such as managed file transfer, data classification, and more is a...
Blog
What Do Emerging Data Privacy Laws in the U.S. Mean for You?
By Heath Kath on Tue, 07/26/2022
Image
What is Data Privacy?
One can think of data privacy as all the processes involved in how confidential or personal information or data is collected, used, and shared or governed. No singular policy governs data privacy, with requirements and penalties varying across states and countries. Data privacy laws are legal constructs...
Blog
Largest Data Breaches in Last 10 Years
By Heath Kath on Tue, 07/19/2022
Image
Bigger is often better. A bigger slice of pizza or a bigger paycheck sounds pretty nice. An extra-large data breach, not so much.
Listing out the biggest data breaches of all time can be challenging, as the next big one could be right around the corner. At the time of this writing, reports are out that the Personally...
Blog
Lessons Learned from the REvil Ransomware Attack of 2021
By Scott Messick on Tue, 07/12/2022
Image
Fireworks lighting up the sky, the smell of backyard grills cranking out delicious food, and organizations reeling from massive global cyberattacks. Aaah….those not-so-sweet memories of that first weekend in July 2021, when hundreds of businesses were smacked with the financial, logistical, and reputational ramifications of...
Blog
This Month in Cybersecurity: Summer is Here, but There’s No Vacation From Cyberattacks
By Heath Kath on Thu, 07/07/2022
Image
June generally marks the start of summer, although anyone thinking the cyber criminals will take a few months off should probably think again. Not only has one of most sacred of summer institutions – Wimbledon – been subject to a threat, but fresh attacks and threats emerged all over the world.
It’s clear that organizations...
Blog
What is the Smominru Botnet?
Thu, 06/30/2022
Image
What is the Smominru Botnet?
Though its origins date back to 2017, Smominru is a dangerous botnet that has been making headlines recently as it continues to spread, attacking targets in every industry. Smominru, which also operates under known variants like including Hexmen and Mykings, has infiltrated hundreds of thousands...
Blog
Secure File Sharing for Banks Gets a Boost from GoAnywhere MFT
By Chris Spargen on Thu, 06/23/2022
Image
Secure file sharing for banks has always been of utmost importance and is only gaining traction in the face of common cybersecurity threats and compliance requirements alike.
Requirements like PCI DSS, GDPR, GLBA, and more can make processes more complicated, even as the safeguards outlined within them promote data security to...
Blog
What is Ransomware and How to Detect and Prevent It
By Heath Kath on Tue, 06/21/2022
Image
What is Ransomware?
Let’s start with the basics. The simple definition of ransom is “a consideration paid or demanded for the release of someone or something from captivity.” Ransomware, then, is a way for bad actors to encrypt information and hold it ransom in exchange for money—typically untraceable bitcoin.
There are...