Filter by Category

Resolve to Make Files More Secure in the New Year

Confetti surrounding file-related text


Make Resolutions - AND Keep Them

Resolutions. Every year you make them. Every year you break them. Make 2020 the year you finally resolve to make your file transfers more secure. Do it — even if you’re a stranger to the gym, you still sport those extra 10 pounds and haven’t called your mom in a week.

Don’t wait until mid-January to feel guilty about still sending files to your trading partners without a secure file transfer solution. Make solid plans before that crystal ball drops on the New Year to make unsecure file transfers “be forgot and never brought to mind...” again, as that famous song recommends.

While concerns about hackers getting into your system’s network are certainly valid, the focus needs to be on the valuable, often highly sensitive data that is exchanged daily, or many times each day with trading partners, vendors, and more.

Resolve to Secure Your Files

  • Review your cybersecurity strategy. Go over and perhaps tweak your plan to avoid malware, unencrypted data, spear phishing scams, and more which can seriously impact your business, your reputation and your bottom line. Don’t have that strategy in place yet? That’s sooo last year! Here are some cybersecurity tips.
  • Asses your cloud-based applications. While Google Drive, Microsoft OneDrive, and Dropbox are popular and simple to use, they are not without risk in terms of file security. A robust managed file transfer system with built-in cloud integrations or connectors can make sharing files via the cloud both easy and secure.

Related reading: Should You Use a File Sharing App?

  • Secure your file transfers. At the very least, you should be using a secure file transfer solution, not simply FTP – which was the answer last decade! Secure file transfers provide for authentication between trading partners either with a user ID and password or one that’s validated with an SSH key or SSH key/password combo.
  • Reduce risk from human error: Upgrade your file transfer method to one that works to eliminate the risks inherent with human error, bad scripts or even a poorly timed vacation from that one person who “does” file transfers. An MFT, or managed file transfer tool works from a single point of administration to automate processes, ensure secure connections and provides a tracking report of file transfer activity.
  • Go simply securing your files and “manage” them. If it feels as if your files are as scattered and uncontrolled as confetti, it’s time to step up to a managed file transfer (MFT) tool. MFT gives you more control from a user-friendly dashboard-style environment.

Related reading: Buyers Guide: Secure Managed File Transfer

Resolve to Manage Your File Transfers

An MFT solution like GoAnywhere MFT not only lets you share files of any size securely, you can also automate workflows, get notifications and restarts should something go wrong. Need to meet compliance rules and regulations? GoAnywhere also provides detailed audit trails and reports.

I want to keep my resolutions!

Start my free trial!

Related Posts


5 Tips for Large File Transfers

It doesn't matter if you’re a small organization, a small-to-medium-sized (SMB) business, or an enterprise: at some point, you’ll likely need to exchange a large file transfer with a trading…


7 Steps to Protect Yourself Against Corporate Spear Phishing

Anyone with an email account is used to spam. It happens one day: you get that first unsolicited email, and then a flood of ads, flash sale offers, and foreign bank transaction requests rushes into…


File Transfers: Do Them the Right Way

File Transfer Done Right When it comes to transferring information such as patient files or legal files from point A to point B, you’ve got options. Lots of options. However, not all file transfers…


Keeping File Transfers Secure from Hackers and Cyber Threats

In the battle to secure information, it helps to know a little bit about how it can be compromised. Using FTP is one way to expose critical vulnerabilities that can allow credentials to be hacked.…