Filter by Category

The Culture of Data Security

We hear a lot of buzz about protecting both customer and company data, but it's alarming how few IT departments and enterprise users are protecting their data correctly. A recent survey conducted for Oracle reveals that fewer than 30% of their respondents are encrypting personally identifiable information.

Data and network security should be the basis for every IT decision, but it is typically an afterthought. Oracle's report also concludes that half of companies surveyed profess a strong commitment to data security, but only 17% have begun to scratch the surface.

Lack of data security is often due to corporate culture and the fear of change. Most companies at the corporate level agree they are committed to data security and protecting customer records. If a company's official stance is to protect their data, where are the security holes?

We believe the largest security holes exist in the departments outside the core IT organization. They don't place the same value on the data as the IT Security team. Many companies still allow their employees to perform file transfers directly from their desktops and laptops using FTP or other unsecure tools. Not only are these ad-hoc methods unsecure and capable of exposing passwords or entire databases, they don't all function alike and don't provide centralized logs.

Educating employees about the dangers of unsecured and/or unnecessary data transfer is more business-friendly than preventing it all together. Part of this process should be moving everyone to a managed file transfer methodology, like GoAnywhere MFT. This not only secures your data transfers, but it creates a digital paper trail showing where assets are going, which is important when you consider all the data security compliance regulations in effect today.

Data security for the millions of files sent over the Internet or within "the cloud" is of great importance to all industries, including health care, retail, banking, and finance. Internet transfers include the critical data needed to conduct business, such as customer and order information, EDI documents, financial data, payment information, and employee- and health-related information. Many of these information transfers relate to compliance regulations such as PCI DSS, SOX, HIPAA and HITECH, state privacy laws, or other mandates.

We need to grow a data security culture that includes securing file transfers.

Latest Posts


Which is Better? - AS2 vs. AS4

August 16, 2019

AS2 vs. AS4 AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and…


Why You Should Migrate from Your Current MFT Software

August 12, 2019

Is Your MFT Solution Keeping Up with Your File Transfer Requirements? With the increasing responsibilities IT professionals must juggle, including managing a myriad of daily tasks, addressing…


GDPR: Understanding the 8 Rights of Data Subjects

August 5, 2019

Find out what these new rights mean for your organization and how you can prepare. GDPR…


Think Your Customer Data was Exposed? Follow These Steps

July 31, 2019

When a prospect or customer shares personal data with a business, they expect their information will be stored securely, kept safe from vulnerabilities, and used only for the purposes with which it…


Is FTP Dead?

July 29, 2019

Is FTP still a viable option for sending file transfers? While organizations across all industries have started shifting to secure FTP protocols like SFTP and FTPS, a surprising number of businesses…