Filter by Category

The Culture of Data Security

We hear a lot of buzz about protecting both customer and company data, but it's alarming how few IT departments and enterprise users are protecting their data correctly. A recent survey conducted for Oracle reveals that fewer than 30% of their respondents are encrypting personally identifiable information.

Data and network security should be the basis for every IT decision, but it is typically an afterthought. Oracle's report also concludes that half of companies surveyed profess a strong commitment to data security, but only 17% have begun to scratch the surface.

Lack of data security is often due to corporate culture and the fear of change. Most companies at the corporate level agree they are committed to data security and protecting customer records. If a company's official stance is to protect their data, where are the security holes?

We believe the largest security holes exist in the departments outside the core IT organization. They don't place the same value on the data as the IT Security team. Many companies still allow their employees to perform file transfers directly from their desktops and laptops using FTP or other unsecure tools. Not only are these ad-hoc methods unsecure and capable of exposing passwords or entire databases, they don't all function alike and don't provide centralized logs.

Educating employees about the dangers of unsecured and/or unnecessary data transfer is more business-friendly than preventing it all together. Part of this process should be moving everyone to a managed file transfer methodology, like GoAnywhere MFT. This not only secures your data transfers, but it creates a digital paper trail showing where assets are going, which is important when you consider all the data security compliance regulations in effect today.

Data security for the millions of files sent over the Internet or within "the cloud" is of great importance to all industries, including health care, retail, banking, and finance. Internet transfers include the critical data needed to conduct business, such as customer and order information, EDI documents, financial data, payment information, and employee- and health-related information. Many of these information transfers relate to compliance regulations such as PCI DSS, SOX, HIPAA and HITECH, state privacy laws, or other mandates.

We need to grow a data security culture that includes securing file transfers.

Latest Posts


iPaaS and MFT: What You Need to Know

September 24, 2020

Once upon a time, you carried an MP3 player to listen to music, a cell phone to text and make calls, and a book if you wanted to read. Video games and the internet? Best to use your preferred gaming…


What is Electronic File Transfer?

September 22, 2020

Meet Electronic File Transfer If your IT department is still relying on outdated methods like FTP, PC tools, or legacy scripts to meet your organization’s data transfer needs, now is the time to…


What is a Cloud Connector?

September 17, 2020

The cloud and all its possibilities for connecting with customers, vendors, trading partners, and more is exciting. Managing your organization’s transition to the cloud – whether you’re…


How Amazon Web Services Works with GoAnywhere MFT

September 16, 2020

“Alexa, What is MFT?” While that may not be a question you’ve ever asked your virtual assistant, it’s not outside the realm of possibility – Amazon has quickly become ubiquitous for online…


Why You Should Use Scheduled File Transfer Software

September 15, 2020

Have you set up Amazon auto-deliveries? Installed a smart thermostat to keep your house the perfect temperature throughout the day? Approved auto-pay for your bills? Today’s world makes it easy to…