Blog

Blog

How MFT Can Offset the Rising Cost of Data Breaches in 2022 

There’s plenty to be concerned about when it comes to data breaches. At top of mind, there’s always the information that’s stolen, be it customer data, personal emails, confidential files, or any other number of company secrets that are supposed to remain within the company. Then there’s the monetary cost of the data breach – the amount of...
Blog

How to Evaluate File Transfer Solutions

How to Choose a File Transfer SolutionWhen it comes to software or technical solutions you’ve got options, sometimes too many of them. Thankfully, there are plenty of strategies to help you narrow down your choices and make an informed decision. You can ask an industry peer, read user reviews on any number of review sites, or request a demo or a...
Blog

This Month in Cybersecurity: Has Cybersecurity Become the Greatest Concern for Global Business Leaders?

It can be easy for any organization to focus only on its own concerns and challenges. But irrespective of industry or location, one thing that unites businesses is the constant threat of a cyberattack and the damage it might cause.When sovereign wealth fund companies state cybersecurity is more of a concern than the market, or when Africa launches a...
Blog

Security Solutions for Managed File Transfer

By Christopher R. Wilder Research Director & Senior Analyst, TAG Cyber Forbes Contributor Businesses are sharing more sensitive information every day. CISOs and CIOs face the challenge of securing data shared between employees, customers, and third parties. Managed file transfer (MFT) is the solution most organizations use to send and receive...
Blog

PCI DSS 4.0 - What to Expect, What's Coming, How to Comply

Get ready for more stringent PCI DSS compliance requirements. The PCI Security Standards Council (PCI SSC) updated its version 4.0 requirements in March 2022, in large part to address increasingly sophisticated cybercriminal threats. Rapidly growing contactless and cloud-based card usage also helped nudge an update to PCI DSS requirements, which...
Blog

Are SSH and SFTP the Same?

Are SSH and SFTP the Same?SSH and SFTP are a classic pair. They intertwine when it comes to securing communication, and while they have similar capabilities, they are not the same thing. So, what’s the difference between them? Read on to find out. What is SSH?Secure Shell (SSH) is a transport layer that is used to secure...
Blog

Security Risks of File Transfers and How to Reduce Them

Transferring files between customers and trading partners, especially files containing sensitive data without appropriate data security protection solutions applied, involves at least some level of risk. You might accidentally send files to the wrong recipient. Or your latest email attachment was sent with an unsecure File Transfer Protocol (FTP)...
Blog

How to Secure Your Data Exchanges

Exchanging Data Securely Requires Stepped Up Data Transfer MethodsExchanging data is easy, right? Just grab a file, attach it, and hit “send.” Then sit back and relax. Not so fast! If you want to securely exchange data and protect any sensitive data your files may contain, you need to send them with a secure file transfer solution that protects data...
Blog

5 Things You Should Know About Digital Rights Management (DRM)

As the ongoing digital revolution continues to evolve the ways we do business, even the most standard practices of data security are no longer enough. “We're getting to the point where simply sending confidential information with basic encryption is no longer an acceptable method,” states Ian Thornton-Trump, CISO at Cyjax. While managed file transfer ...
Blog

This Month in Cybersecurity: The Weather is Heating Up and So Are Cyberattacks

At the time of writing, much of Europe and the U.S. is in the midst of a major heatwave, delivering record temperatures and concerns about climate change. Just as the heat is rising, so is the threat of cyberattacks. New data has emerged that reveals 2022 is looking like it could be the worst year ever for cybersecurity in terms of the volume...
Blog

4 Ways You Can Use Your Digital Rights Management Tool

In an increasingly collaborative work environment, it’s more important now than ever before that your organization has the highest level of visibility and control possible over its data. While knowing how to choose the right data security solutions such as managed file transfer, data classification, and more is a challenge in and of itself,...
Blog

What Do Emerging Data Privacy Laws in the U.S. Mean for You?

What is Data Privacy? One can think of data privacy as all the processes involved in how confidential or personal information or data is collected, used, and shared or governed. No singular policy governs data privacy, with requirements and penalties varying across states and countries. Data privacy laws are legal constructs that set clear lines...
Blog

Largest Data Breaches in Last 10 Years

Bigger is often better. A bigger slice of pizza or a bigger paycheck sounds pretty nice. An extra-large data breach, not so much.Listing out the biggest data breaches of all time can be challenging, as the next big one could be right around the corner. At the time of this writing, reports are out that the Personally Identifiable Information (PII) of 1...
Blog

Lessons Learned from the REvil Ransomware Attack of 2021

Fireworks lighting up the sky, the smell of backyard grills cranking out delicious food, and organizations reeling from massive global cyberattacks. Aaah….those not-so-sweet memories of that first weekend in July 2021, when hundreds of businesses were smacked with the financial, logistical, and reputational ramifications of ransomware attacks. ...
Blog

This Month in Cybersecurity: Summer is Here, but There’s No Vacation From Cyberattacks

June generally marks the start of summer, although anyone thinking the cyber criminals will take a few months off should probably think again. Not only has one of most sacred of summer institutions – Wimbledon – been subject to a threat, but fresh attacks and threats emerged all over the world. It’s clear that organizations must remain vigilant...
Blog

What is the Smominru Botnet?

What is the Smominru Botnet? Though its origins date back to 2017, Smominru is a dangerous botnet that has been making headlines recently as it continues to spread, attacking targets in every industry. Smominru, which also operates under known variants like including Hexmen and Mykings, has infiltrated hundreds of thousands of machines,...
Blog

Secure File Sharing for Banks Gets a Boost from GoAnywhere MFT

Secure file sharing for banks has always been of utmost importance and is only gaining traction in the face of common cybersecurity threats and compliance requirements alike. Requirements like PCI DSS, GDPR, GLBA, and more can make processes more complicated, even as the safeguards outlined within them promote data security to protect both...
Blog

What is Ransomware and How to Detect and Prevent It

What is Ransomware?Let’s start with the basics. The simple definition of ransom is “a consideration paid or demanded for the release of someone or something from captivity.” Ransomware, then, is a way for bad actors to encrypt information and hold it ransom in exchange for money—typically untraceable bitcoin.There are four main ways that hackers...
Blog

Why it’s Time to Adopt Zero Trust Architecture

If you work in cybersecurity, the chances are that you will have come across the phrase Zero Trust over the past few years. It’s become a real industry buzzword, but there is substance behind the noise on this occasion. To the outsider, it’s a term that is easy to misinterpret. It sounds draconian and severe and could be perceived as...
Blog

A Ransomware Special - WannaCry’s Anniversary and More: This Month in Cybersecurity

May’s ‘this month in cybersecurity’ is somewhat of a ransomware news special. In addition to a ransomware attack on Costa Rica and the continued expansion of BlackByte, this month also marks the fifth anniversary of WannaCry, perhaps the most damaging malware attack the world has seen.Ransomware remains hugely prevalent, but is an attack likely to...