GoAnywhere Blog: Tag FILE SECURITY

Struggling to keep up with the latest and greatest in managed file transfer?

Subscribe to the GoAnywhere blog, and we’ll send essential IT topics and industry news right to your inbox.

By submitting this form, you consent to receiving a monthly blog digest email from GoAnywhere, A HelpSystems Solution.

Filter by Category
Cybersecurity and the Coronavirus

FEATURED BLOG: How the Coronavirus is Impacting Your Data Security

As the coronavirus continues to generate headlines around the world, it’s not just your health at risk – your private data is at risk too.

Read More

Key made out of code. File encryption software helps you keep your data under lock and key.

What is File Encryption Software?

File encryption software is a tool that encodes data for better security. Encryption is essential to both cybersecurity and compliance. Learn how file encryption software is used to safeguard data worldwide.

Read More


Three data security lessons learned from a data breach

3 Lessons Learned from a Data Breach

Data breaches increase year by year, and hackers become more confident and inventive. Learn the top three takeaways from recent security breaches, and how you can protect your data.

Read More


Collaborate securely with an Enterprise Files Sync and Share solution

4 Benefits of On-premises Enterprise File Sync and Sharing

Securely storing documents and collaborating has never been easier. GoDrive, an EFSS solution from GoAnywhere, gives you control over your file sync and share and helps you meet your file security needs.

Read More


Confetti surrounding file-related text

Resolve to Make Files More Secure in the New Year

Resolve to make your file transfers more secure and managed in the New Year. It’s an easy resolution to keep with GoAnywhere MFT on your calendar.

Read More


encrypt files in Linux with PGP encryption software

How to Encrypt Files in Linux

Open PGP, GPG, ZIP, and AES are the top contenders for protecting sensitive Linux files at rest. Here’s how to determine which method is right for you, and recommended encryption tools to use.

Read More


best practices for IBM i file transfers

5 Best Practices for IBM i File Transfers

Don’t let your data suffer! Use these 5 best practices for the IBM i to protect your file transfers from security vulnerabilities and user oversight.

Read More