Guide
Why Automating Encryption and Decryption Makes Good Cybersecurity Sense
Not every message or piece of data is for everyone’s eyes. That’s the basic premise of why organizations need encryption. But how does it work? Do you need different types of encryption for different situations? Can encryption be integrated with your existing business technologies?
Our guide, Why Automating Encryption and Decryption Makes Good Cybersecurity Sense, offers a quick read of the...
Guide
Your Guide to a Secure Hybrid Cloud
There's a lot to learn about implementing a hybrid cloud environment. Thankfully, this white paper makes it easy. Inside your copy, you'll explore:
Modern cloud statistics
The difference between a hybrid cloud and a full cloud
Who uses a hybrid cloud and when
Considerations for cloud cybersecurity, automation, and encryption
How to use a hybrid cloud in your organization
You'll also learn...
Blog
Revoke Access to Your Files from Anywhere – Digital Rights Management (DRM) and How it Works
Thu, 08/18/2022
Your auditor sends a copy of your company’s recent financial statements to his firm to verify another clean pass. Because he’s worked there for years, he sends the file to his partner without encrypting it and leaves for the day. On his way home, his phone buzzes as an email notification comes in with the subject “Wrong Jeff?” Almost immediately, your...
Blog
How to Secure Your Data Exchanges
By Heath Kath on Mon, 08/15/2022
Exchanging Data Securely Requires Stepped Up Data Transfer Methods
Exchanging data is easy, right? Just grab a file, attach it, and hit “send.” Then sit back and relax. Not so fast! If you want to securely exchange data and protect any sensitive data your files may contain, you need to send them with a secure file transfer solution that protects...
Blog
5 Things You Should Know About Digital Rights Management (DRM)
Wed, 08/10/2022
As the ongoing digital revolution continues to evolve the ways we do business, even the most standard practices of data security are no longer enough. “We're getting to the point where simply sending confidential information with basic encryption is no longer an acceptable method,” states Ian Thornton-Trump, CISO at Cyjax. While managed file transfer ...
Blog
This Month in Cybersecurity: The Weather is Heating Up and So Are Cyberattacks
By Heath Kath on Thu, 08/04/2022
At the time of writing, much of Europe and the U.S. is in the midst of a major heatwave, delivering record temperatures and concerns about climate change. Just as the heat is rising, so is the threat of cyberattacks.
New data has emerged that reveals 2022 is looking like it could be the worst year ever for cybersecurity in terms of the volume and...
Blog
4 Ways You Can Use Your Digital Rights Management Tool
Tue, 08/02/2022
In an increasingly collaborative work environment, it’s more important now than ever before that your organization has the highest level of visibility and control possible over its data. While knowing how to choose the right data security solutions such as managed file transfer, data classification, and more is a challenge in and of itself, the...
Blog
Largest Data Breaches in Last 10 Years
By Heath Kath on Tue, 07/19/2022
Bigger is often better. A bigger slice of pizza or a bigger paycheck sounds pretty nice. An extra-large data breach, not so much.
Listing out the biggest data breaches of all time can be challenging, as the next big one could be right around the corner. At the time of this writing, reports are out that the Personally Identifiable Information (PII)...
Blog
Lessons Learned from the REvil Ransomware Attack of 2021
By Scott Messick on Tue, 07/12/2022
Fireworks lighting up the sky, the smell of backyard grills cranking out delicious food, and organizations reeling from massive global cyberattacks. Aaah….those not-so-sweet memories of that first weekend in July 2021, when hundreds of businesses were smacked with the financial, logistical, and reputational ramifications of ransomware attacks.
While...
Blog
This Month in Cybersecurity: Summer is Here, but There’s No Vacation From Cyberattacks
By Heath Kath on Thu, 07/07/2022
June generally marks the start of summer, although anyone thinking the cyber criminals will take a few months off should probably think again. Not only has one of most sacred of summer institutions – Wimbledon – been subject to a threat, but fresh attacks and threats emerged all over the world.
It’s clear that organizations must remain vigilant and...
Blog
What is the Smominru Botnet?
Thu, 06/30/2022
What is the Smominru Botnet?
Though its origins date back to 2017, Smominru is a dangerous botnet that has been making headlines recently as it continues to spread, attacking targets in every industry. Smominru, which also operates under known variants like including Hexmen and Mykings, has infiltrated hundreds of thousands of machines, primarily...
Blog
What is Ransomware and How to Detect and Prevent It
By Heath Kath on Tue, 06/21/2022
What is Ransomware?
Let’s start with the basics. The simple definition of ransom is “a consideration paid or demanded for the release of someone or something from captivity.” Ransomware, then, is a way for bad actors to encrypt information and hold it ransom in exchange for money—typically untraceable bitcoin.
There are four main ways that hackers...
Blog
Why it’s Time to Adopt Zero Trust Architecture
By Scott Messick on Tue, 06/14/2022
If you work in cybersecurity, the chances are that you will have come across the phrase Zero Trust over the past few years. It’s become a real industry buzzword, but there is substance behind the noise on this occasion.
To the outsider, it’s a term that is easy to misinterpret. It sounds draconian and severe and could be perceived as meaning...
Blog
End-to-End Rights Management Made Simple with SFT
By Chris Spargen on Tue, 06/07/2022
Digital files are the crown jewels of any organization, and end-to-end rights management is increasingly the goal of businesses who need to transfer files securely. How can organizations ensure data is secure from inception to publication, especially when third parties enter the picture?
Enter secure file transfer plus digital rights management....
Blog
A Ransomware Special - WannaCry’s Anniversary and More: This Month in Cybersecurity
By Heath Kath on Thu, 06/02/2022
May’s ‘this month in cybersecurity’ is somewhat of a ransomware news special. In addition to a ransomware attack on Costa Rica and the continued expansion of BlackByte, this month also marks the fifth anniversary of WannaCry, perhaps the most damaging malware attack the world has seen.
Ransomware remains hugely prevalent, but is an attack likely to...
Blog
What is Ryuk Ransomware?
Tue, 05/17/2022
The last few years have seen a rise in stories about Ryuk, a powerful piece of ransomware that is best known for targeting healthcare institutions, but has also been attacking municipal governments, state courts, enterprises, and large universities, among others. Many of these organizations have paid hefty fees – between $100,00 and $500,000, payable...
Blog
This Month in Cybersecurity: Time for a Spring Clean?
By Heath Kath on Thu, 05/05/2022
Spring is the time of year when people start thinking about decluttering, cleaning, and readying themselves for the next season—spring cleaning. It's a tradition that dates back centuries, but it could also be applied to an organization's cybersecurity.
There’s never a bad time to reflect on how best to keep your organization safe, especially given...
Blog
How GoAnywhere MFT Works with SharePoint
By Chris Spargen on Thu, 04/28/2022
Data and documents are the lifeblood of the business and sharing that data to both external trading partners and internal stakeholders is essential. Discover how GoAnywhere works with one of today’s favorite intranet sites for teams and file sharing: SharePoint.
What is SharePoint?
SharePoint helps teams meet various business needs by providing...
Blog
Data Security Measures for the Return to Office
By Heath Kath on Tue, 04/05/2022
Whether your employees are headed back to the office enthusiastically, with a bit of dread, or a mix of emotions, they’ll bring with them more than just their laptops, lunches, and stories from their work-from-home days upon their return. They’ll also potentially be bringing along some data security risks.
While risks around unauthorized file...