GoAnywhere Blog: Tag DATA SECURITY

Struggling to keep up with the latest and greatest in managed file transfer?

Subscribe to the GoAnywhere blog, and we’ll send essential IT topics and industry news right to your inbox.

By submitting this form, you consent to receiving a monthly blog digest email from GoAnywhere, A HelpSystems Solution.

Filter by Category
which is better: an SFTP solution or an MFT solution?

FEATURED BLOG: Which is Better: SFTP vs. MFT?

SFTP or MFT file transfer solutions? That is the question. In this article, we compare secure FTP protocol solutions to MFT solutions to determine why an organization might need to choose one over the other.

Read More

Developing a Plan for Data Risk Management

Does your organization have a data and risk management strategy in place? Here’s what to watch for and how you can develop a data risk management plan.

Read More


Person using a cellphone with an overlaid lock illustration

The Difference Between Data Privacy, Data Protection, and Compliance

Data privacy, data protection, and compliance overlap in key areas, but each are unique concepts. Learn what they have in common, what makes them different, and how you can successfully comply with data privacy and protection requirements.

Read More


Data Breaches in Small Business

Data Breaches in Small Business

No business is too small to be targeted in a data breach. If you are a small business owner, consider learning about the common threats you’re up against and the steps you can take to improve your cybersecurity.

Read More


Internet Day celebrates worldwide connectedness

Internet Day: What is it and Why Does it Matter?

Ever since that first “send” occurred, the internet has exploded. Oct 29th marks Internet Day around the world and is an occasion to reflect on its impact and best practices, such as MFT, for safer usage.

Read More


The 5 Biggest Cybersecurity Threats of 2022: How to Avoid Cybersecurity Attacks

Learn about the biggest threats to cybersecurity in the year 2022 and how to protect your organization from cybersecurity attacks tomorrow.

Read More


What is the Data Security Lifecycle?

What is the data security lifecycle, and how does it impact your business? Discover the stages of the data security lifecycle, and how end-to-end encryption can help with your data protection.

Read More


This Month in Cybersecurity

Ready to learn more about how to protect your organization from cybersecurity threats? Learn what’s new in the world of cybersecurity as well as how you can continue to implement preventative cybersecurity practices.

Read More


Government organizations are charged with upholding new cybersecurity order.

How to Meet Biden’s Executive Order on Cybersecurity Requirements

President Biden’s executive order on Improving the Nation’s Cybersecurity calls for stronger and more layered data security as part of a focus on data-centric security architecture centered around the principals of zero-trust.

Read More


Healthcare Data Security

The Top 10 Healthcare Data Breaches of 2020

Regarding data breaches in healthcare, 2020 was the worst. Exposed patient data flooded the year from one data breach to the next. Read about the biggest healthcare breaches of 2020 in our blog.

Read More


Person pointing out data security best practices for CISOs on a laptop

Data Security Best Practices Every CISO Should Know

Shouldering data security as a CISO is a hefty job. Adopting a few of the best practices to surround data can make it a lot easier.

Read More