Blog

Blog

How Managed File Transfer (MFT) Can Strengthen the Supply Chain

Moving essential goods or services across the country or around the world is an industry many people don’t give much thought to, unless of course a shipment is late or misdirected, or when geopolitical shifts alter the course of “normal” supplies. This critical function of modern life, with a market projected to near $31 billion by 2026, is not without risk or disruptions. And these risks can come...
Blog

8 Ways Credit Unions Gain Security, Compliance & Efficiency with MFT

When it comes to cybercrime, credit unions are no less targeted than large, multi-national banking institutions. After all, if money talks, cybercrime targeting financial institutions screams. According to Security Magazine, 64% of surveyed financial institutions experienced a cyberattack in 2024. And according to an American Banking Journal article, the average cost of a financial sector data...
Blog

Uploading Big Data for Employees While on the Road

Land surveyors, film production crews, power line and gas pipeline inspectors, news reporters, and accident investigators all have a few things in common. First, they are almost always on the road and second, they need to collect a lot of digital information that needs to be uploaded to the home office quickly and reliably.Achieving big data transfers from the road doesn’t have to be laborious or...
Blog

Secure File Transfers from Unsecured Locations: What to Know

Whether you're working from a coffee shop or reviewing sensitive files from a hotel room while traveling, today’s workforce thrives and often demands flexibility. But this work-from-anywhere convenience comes with risk—especially when accessing or transferring sensitive data over unsecured networks. Public Wi-Fi or mobile hotspots can get you connected when away, but they can also open the door to...
Blog

UDP Technology: Essential When Transferring Big Data Over Satellite

Organizations expect security and stability when sending sensitive files. However, achieving these goals can get a bit tricky without robust and accelerated file transfer software—especially when using satellite services. Internet over satellite has been around since the mid-1990s using traditional data satellites such as VSAT, HughesNet, and Iridium – all which operate in geo-stationary orbit (22...
Blog

Ransomware and Disaster Recovery: Create a Plan for Your Data

Disasters come in many forms —floods, earthquakes, hurricanes and tornadoes — all with the power to destroy or seriously impact your organization’s data. And cybercrime disasters, such as ransomware can create disastrous results of their own. In today’s cybersecurity landscape, ransomware probably has a higher chance of hitting your organization than those unfortunate weather-related crises. And...
Blog

Key MFT Protocols and Their Security Implications

Deciding how to securely send files doesn’t have to be difficult. There are plenty of file transfer protocols that can do the job efficiently and securely (as well as a few that should be out of consideration).File Transfer Protocols and Their Security ConsiderationsFTP (File Transfer ProtocolSecurity considerations: Transmission of files is unencrypted, and data is sent in plaintext (including...
Blog

Stop Bad IPs Continually with GoAnywhere’s Threat Brain

In today’s cybersecurity environment, every bit of proactive defense helps to deter bad actors from entering and hanging around with potentially malicious intent. As a countermeasure, GoAnywhere MFT recently integrated Threat Brain – unique built-in threat intelligence feature which aggregates indicators from Fortra’s deep portfolio of cybersecurity solutions to continuously identify and block IPs...
Blog

GoAnywhere v7.8 Brings More Performance to File Transfers

What’s New in GoAnywhere? Version 7.8 Moves Closer to File Acceleration IntegrationGoAnywhere MFT has released v7.8, the latest version of the software Info-Tech rated #1 in the MFT sector for four years running. This latest release, along with new releases of Gateway and Agents, enhances security, performance, efficiency, and reliability.“Many customers are hitting network and performance...
Blog

MFT in the Cloud: Key Considerations

If your organization wants to add the ability to transfer files via the cloud or even completely convert from an on-premises solution to a cloud solution for convenience or cost-effectiveness, there are a few considerations to help ensure the data entrusted to you is protected and managed.Primarily, you’ll want to confirm that moving all or some of your file exchanges to the cloud:Maintains robust...
Blog

How MFT Supports Data Governance

Managed File Transfer (MFT) solutions are designed to ensure that data is secure, controlled, and compliant as it moves between and within organizations. As such, they play a critical role in broader data governance policies and guidelines. What is Meant by Data Governance? Data governance can be described as the comprehensive process used to control the security, integrity, availability, use,...
Blog

What Is an SFTP Port and Why Does It Matter?

If you need to establish a secure connection between a client and server to transfer business-critical or sensitive files, an SFTP (Secure File Transfer Protocol) port is a strong choice for securing data in transit. The SFTP port is a network port used to establish a secure connection or communication channel between the client and the server. It ensures that during transit, data is encrypted...
Blog

Sharing Files with Mobile Devices: What to Know

The debate on whether an organization should allow employees to bring their own devices (BYOD) to work has both its champions and its naysayers. Regardless of which side your organization falls on letting employees use their personal phones or tablets, it is still vital to ensure that activities, including exchanging and collaborating on files, are done securely.Benefits of a BYOD PositionThere...
Blog

Streamlining Government File Sharing with MFT

Efficiency: It’s a goal that’s permeating conversations in government circles at all levels lately (and other industries as well). Whether that aim is eliminating cumbersome processes or error-prone legacy systems, nearly every department and entity (including contractors working with government entities) are aiming for a more streamlined way of doing more with less – less effort, fewer personnel,...
Blog

How MFT Supports PCI CP Compliance Through Secure File Transfers

You may have heard about PCI DSS, but if you’re familiar with PCI CP (Payment Card Industry Card Production and Provisioning), chances are you’re a credit card manufacturer (or somewhere in the supply chain). And you also likely understand the risks of insecure file transfers in the PCI CP process. To level-set, we’ll review the basics of PCI CP requirements, and how GoAnywhere Managed File...
Blog

Keep Proactive MFT Security Top of Mind

While 2024 had a slight decrease (1%) in the number of data breaches, the impact and scale of these breaches overshadowed the actual number of reported breaches (3,158 for the year). In fact, just six breaches accounted for 85 percent of the total number of notices sent to victims, according to digitaltransactions.net.These six breaches alone exposed at least 100 million records each. While...
Blog

MFT Solutions Overview

What an MFT Solution is and What it is NotA Managed File Transfer (MFT) solution is most often defined as a secure and automated platform specifically developed to manage the processes of transferring data between systems, users, and organizations. MFT also encrypts files and provides for tracking and auditing of file movement to help meet compliance requirements. Centralized management of MFT...
Blog

NIS2 and DORA Updates: How MFT Helps Support Directives

Keeping up with the latest compliance or regulatory directives is vital to ensure your organization won’t run afoul of measures designed to keep your organization, your customers, and your trading partners safer from cybersecurity threats. This article outlines where two key directives: NIS2 and DORA stand today and why it’s important to be in compliance. As with any compliance measure introduced,...
Blog

SWIFT Members Increasingly Responsible for Security. MFT Can Help.

Global financial institutions rely on SWIFT every day to exchange information vital to secure payments. However, as members of The Society for Worldwide Interbank Financial Telecommunications (SWIFT) network know, the network alone isn’t enough to ensure safety. This is why SWIFT rolled out their Customer Security Program (CSP).Within the CSP, SWIFT has established a Customer Security Controls...
Blog

How to Encrypt a File with PGP Encryption

PGP encryption is one of the most popular encryption protocols and for several good reasons.Robust Managed File Transfer (MFT) solutions offer multiple encryption tools built into their MFT servers such as Encryption at rest, Password Protected ZIP, ZIP with AES Encryption, S/MIME for AS2, AS3, and AS4. Let’s zero in on when and why someone should use PGP Encryption and take a look at how to...