Blog

Blog

What is the PDPC?

Governments are taking more steps than ever to protect their citizens’ personal data online – and some have been doing so for longer than others. Singapore’s Personal Data Protection Commission (PDPC) was established in 2013, and since then has helped to foster privacy regulations for citizens of the Republic of Singapore.What is the PDPC?The...
Blog

What is NIST?

NIST, the National Institute of Standards and Technology, is a lab and non-regulatory federal agency of the U.S. Department of Commerce. Founded in 1901 as a tool to boost the U.S.'s global competitiveness, NIST fosters efforts to create standards across technology systems. Today, NIST continues to push for innovation in a variety of industries and...
Blog

What are the Secure Messaging Standards in Australia?

Secure Messaging in HealthcareHealthcare is essential to live a healthy life, but it shouldn’t come at the expense of your privacy.Healthcare is an industry that will always be growing, which means that if your situation transitions to a place where you need to see a new doctor or a specialist, your very private and personal health records will need...
Blog

What is the California Consumer Privacy Act?

The California Consumer Privacy Act (CCPA), the latest data privacy law in the Golden State, went into effect on January 1st, 2020. Some have compared it to the UK’s GDPR (General Data Protection Regulation), and they’re not far off – like the GDPR, the CCPA is intended to protect individuals’ private data by making data collection and usage more...
Blog

What is PIPEDA?

PIPEDA, the Personal Information Protection and Electronic Documents Act, is a privacy law that applies to private-sector organizations and businesses throughout Canada.The goal of PIPEDA is to ensure that all provinces and territories protect personal data. This includes:Asking for and obtaining consent when an individual’s information is initially...
Blog

How Banks are Benefiting from MFT Integration

Trying to integrate and tie diverse internal and external banking applications, branches, systems and trading partners together so they work seamlessly with internal and central banking applications can have your IT department constantly untangling complex knots to ensure transactions and information flows easily.There is a way to untangle this...
Blog

PDPA in Singapore Helps Protect Personal Data

What is the PDPA of 2012?The Personal Data Protection Act of 2012 (PDPA) is a law designed to regulate and enforce the proper collection, use, disclosure, and care of the personal data of citizens in the Republic of Singapore. The Personal Data Protection Commission (PDPC) is charged with establishing policies and for reviewing organizational actions...
Blog

7 Essential Resources on PCI DSS Security

Note from the Editor: This article was originally published in February 2017. It has been updated with resources current to PCI DSS version 3.2.1.Did you know that 80% of organizations are not compliant with PCI DSS requirements? That means, if you’re reading this, there’s a pretty good chance your company needs to make adjustments to ensure a fully...
Blog

What is Operation Yellowhammer and How Does it Affect Data Transfers?

What is Operation Yellowhammer? If you are located in the United Kingdom (UK), then you may already be familiar with Operation Yellowhammer and its relationship to Brexit and the European Union (EU). For those of you that haven’t been briefed on Operation Yellowhammer and how it relates to Brexit, now is the perfect time to learn how this...
Blog

Meeting IT Security and Compliance Requirements with GoAnywhere MFT

Meet your IT and compliance requirements easily with GoAnywhere MFT. GoAnywhere helps organizations and IT professionals comply with an array of strict regulations, methods, and technologies. To open a larger, clickable image, choose the "Download" option below.DOWNLOAD For more of an in-depth look into...
Blog

GDPR: Understanding the 8 Rights of Data Subjects

Find out what these new rights mean for your organization and how you can prepare. GDPR (General Data Protection Regulation) is the EU’s new legal framework that replaced the EU Data Protection Directive in May 2018. While the directive was merely a recommendation, GDPR carries the force of law. The purpose of GDPR is similar to...
Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll want to pay close attention...
Blog

I’ve Just Been Breached, Now What?

So, you think (or perhaps you know) you’ve been breached. It’s every organization’s nightmare, and you’re living it, facing local and federal fines, upset customers, public panic, and a loss of intellectual property. A breach can be a harrowing ordeal; if you’re not sure what to do immediately after discovering the breach, your situation can...
Blog

How 3 Financial Institutions Solve File Transfer Needs with MFT Software

On a scale of 1-10, how would you rate the efficiency of your file transfers right now?If you use manual scripts, legacy software, or a myriad of free tools to balance your encryption, automation, cybersecurity, reporting, and collaboration needs, it’s possible you’ll rate your efficiency low on the scale. After all, professionals in banking and...
Blog

IT Pros in Healthcare: How to Choose a Secure File Transfer Solution

Every healthcare provider wants to avoid being the next data breach headline—and unfortunately, we have seen many incidents and their consequences in 2018 so far. The causes of these data breaches range from wrongly configured databases to successful malware attacks and unauthorized user access.For those looking to avoid the pain, embarrassment, and...
Blog

Understanding the GDPR (General Data Protection Regulation)

Note from the Editor: This is an older resource on GDPR. For more on the latest GDPR resources, check out our GDPR resource page.IntroductionWhat is the GDPR?GDPR and the Data Protection Directive2018: The Year of GDPRGDPR and BrexitGDPR Fines and PenaltiesHow to Prepare for the GDPRGDPR and the CloudGDPR Compliant File TransfersIntroductionThe...
Blog

USPS Eliminates FTP, Requires Secure File Transfers

Early this year, the United States Postal Service (USPS) announced the elimination of FTP (File Transfer Protocol) from their business practices and policies—a change that strengthens the security of their data transmissions and addresses recent audit findings.What does this mean for you?The change is still in transition for now, but after August 31, 2017, mailers and shippers will need to send...
Blog

HIPAA Compliance: Guide Details How MFT Helps

Are your file transfers HIPAA compliant? Is your healthcare organization at risk for fines, or worse - a data breach of sensitive patient information? Many healthcare IT teams meet these broad questions with unease. After all, the ramifications of a healthcare data breach can impact organizations and individuals for years to come as well as have...
Blog

Why Healthcare Organizations Need a Secure Data Transfer Solution

The last few years were scary in terms of healthcare cybersecurity. A hack of Banner Health breached up to 3.7 million records. Another data breach at 21st Century Oncology resulted in multiple lawsuits being filed against the organization. When a third party gained unauthorized access to computer systems at Valley Anesthesiology and Pain Consultants, almost 900 thousand patients, employees, and...
Blog

10 Shocking PCI DSS Compliance Statistics

If you work for any organization that processes credit or debit card information, you’ve heard of the Payment Card Industry Data Security Standard (PCI DSS), the regulatory standard aimed at preventing costly data breaches like the ones you may have heard about at Home Depot or TJX. But how much do you really know about PCI DSS compliance? Here are some interesting PCI DSS compliance statistics...