Blog

Blog

SHA-2 and TLS Security for AS2 Transfers

SHA-2 and TLS Security for AS2 Transfers It’s crucial for organizations to take the time to upgrade the security used to protect their AS2 data transfers. In order to be compliant with the latest security standards, you need to be using a modern AS2 solution. Related Reading: AS2 Protocol Software for Client & Server Transfers The Story...
Blog

What is AS2? Common Protocol Explained

For those that ask "What is AS2?," AS2 is an abbreviation for Applicability Statement 2, which is a popular file transfer protocol that allows businesses to exchange data with their trading partners.AS2 protocol combines the use of several secure and widely used technologies including HTTPS, SSL Certificates, S/MIME, and file hashing. By utilizing...
Blog

OpenPGP, PGP, and GPG: What is the Difference?

The privacy capabilities of encryption methods such as Pretty Good Privacy (PGP) allow organizations to achieve a hightened amount of data security and protection. There are various approaches and elements of comparison for these encryption methods, however, and each one comes with their own histories, features, and capabilities. These are: PGP,...
Blog

Keeping File Transfers Secure from Hackers and Cyber Threats

Keep Your Files Secure In the battle to secure information, it helps to know a little bit about how it can be compromised. Using FTP is one way to expose critical vulnerabilities and can allow credentials to be hacked. However, these holes in security can also be easily closed if you know how. How Hackers Discover Vulnerabilities Here's how...
Blog

How to Solve 4 Common Email Security Challenges

Yes. Emailing someone is still one of the easiest ways to share data. However, there are some important caveats to sharing files this way that can put your organization’s file transfers at risk.Email File Transfer ChallengesThese are the four big challenges that organizations should be aware of when transmitting files via email.Email is sent "in the...
Blog

FIPS 140-2 Plays Vital Government Business Role

What is FIPS 140-2?FIPS 140-2 is a standard with which cryptographic-based (encryption) security systems must comply when protecting sensitive data in U.S. government agencies and departments. This FIPS 140-2 standard also extends to other entities that may exchange sensitive data with the federal government, including defense contractors, state...
Blog

Are Insurance Companies Managing Their Risk of Data Breach?

Insurance companies are the experts at analyzing and managing risk. They identify, quantify, and set pricing based on the calculated costs of risk. Naturally, the higher the perceived risk, the higher the cost to mitigate the potential losses.Yet, here is the irony. While those in the insurance industry excel at evaluating risk management for their...
Blog

Are You Next in Line for a Data Breach?

A Data Breach is Closer Than You ThinkAs the percentage of data breaches increase, the risk of organizations losing your sensitive data also increases. No one wants to receive the news that some or all of their personally identifiable information (PII) was stolen.Sure, there are people who are victims of various phishing scams, but it's more likely...
Blog

The Culture of Data Security

Here at Fortra, we hear a lot of buzz about protecting both customer and company data, but it's alarming how many IT departments and enterprise users are still not protecting their data correctly. According to the Ponemon Institute, fewer than 50 percent of organizations have comprehensive encryption protection in place.Prevention vs. RemediationData...