Blog

Blog

Collaboration Tools Like Box.com vs. MFT: What Do You Really Need?

Collaboration tools like Box.com and managed file transfer (MFT) tools like GoAnywhere MFT, are not the same. Both, however, have unique advantages, depending on your organization’s requirements around data. Box is a cloud-based tool for organizational teams to collaborate, manage, and store content. GoAnywhere MFT is a secure managed file transfer...
Blog

How MFT Helps Collaboration in Hybrid Environments

Whether your organization’s employees are back in the office at their desks full time, or more commonly pop into your brick-and-mortar location two to three times a week in hybrid fashion, it’s important to consider how they can securely collaborate. The changing work landscape, with workers spread throughout the world, and schlepping their laptops...
Blog

Education Industry: How MFT Can Help Stretch Resources

Educational institutions, from preschools to university systems, face increasing pressure on budgets as well as personnel lately. When every minute and every dollar counts, bolstering existing resources where possible can offer a bit of relief.One way to stretch those human resources is by automating some of the tasks that are repetitive, mundane, and...
Blog

Is FTPS HIPAA-Compliant?

Complying with stringent HIPAA requirements requires strong encryption protocols. GoAnywhere MFT utilizes FTPS, the more commonly used SFTP, and other protocols for secure file sharing.
Blog

PCI DSS 4.0 - What to Expect, What's Coming, How to Comply

Get ready for more stringent PCI DSS compliance requirements. The PCI Security Standards Council (PCI SSC) updated its version 4.0 requirements in March 2022, in large part to address increasingly sophisticated cybercriminal threats. Rapidly growing contactless and cloud-based card usage also helped nudge an update to PCI DSS requirements, which...
Blog

What Do Emerging Data Privacy Laws in the U.S. Mean for You?

What is Data Privacy? One can think of data privacy as all the processes involved in how confidential or personal information or data is collected, used, and shared or governed. No singular policy governs data privacy, with requirements and penalties varying across states and countries. Data privacy laws are legal constructs that set clear lines...
Blog

Secure File Transfer Drives Compliance and Efficiency for Credit Unions

The unwavering protection of personally identifiable information (PII) is the foundation upon which financial and banking organizations build their services and instill trust in customers. Achieving this requires credit unions and related companies to navigate a fine balance between stringent data security and business efficiency to meet customer...
Blog

HIPAA vs. HITRUST: The Key Differences

What is HIPAA? HIPPA, or the Health Insurance Portability and Accountability Act, is a federal law that addresses regulatory compliance for healthcare organizations. HIPAA sets the standard for protecting sensitive patient data and applies to any company that deals with protected health information (PHI). HIPAA requires healthcare...
Blog

What is HITRUST Compliance?

HITRUST Compliance Helps to Manage RiskThe secure storage and transfer of sensitive data is of the utmost importance to the healthcare industry. Data security and complying with the Health Insurance Portability and Accountability Act (HIPAA) is paramount, yet doing so can often be complex and difficult to maintain.This is where HITRUST comes in as a...
Blog

Cybersecurity Concerns in Healthcare in 2022

Every year the healthcare industry is greeted with headlines stating that ‘last year was the most-breached ever.’ And that trend is unlikely to stop in 2022. The healthcare industry has historically been one of the most-targeted by hackers, and one of the most breached by internal actors. Key reasons why include vast amounts of extra sensitive...
Blog

How Businesses Can Collaborate Securely with GoDrive

Collaborating or sharing information lies at the very heart of business. Securing these information exchanges, however, requires more than a firm handshake. The information your organization owns is priceless, so it’s vital to ensure that it is accessed, manipulated, and shared only by authorized individuals and with security measures that do not...
Blog

The Role Between Shadow IT and Content Collaboration

Shadow IT is Problematic for CollaborationContent collaboration platforms are more popular than ever as organizations produce and share a plethora of content every day. A centralized platform can simplify collaboration and promote productivity, but Shadow IT can put a hindrance on progress and optimal file sharing practices.What is Shadow IT?Shadow IT...
Blog

The Surprising Relationship Between Data Privacy Laws and File Sharing

Location, location, location. Not just the mantra of realtors and would-be buyers – it’s also a concern for data security professionals world-wide. As cloud computing has ramped up across industries, the physical location of stored data has been called into question, alongside concerns stemming from data privacy laws.Read on to discover how data...
Blog

The Benefits of Secure Collaboration Tools

Content collaboration platforms have become critical to an organization’s growth, especially within the context of increased remote work. However, not all content collaboration platforms are created equal: some platforms will prove to be clunky and difficult to navigate, which defeats the purpose of utilizing them. What is Content Collaboration?...
Blog

Is On-Premises Enterprise File Sharing Right for Your Business?

Now that offices are re-opening and bringing employees back under one roof, do you need to revisit your on-premises file sharing solution?What is On-Premises File Sharing?Like other file sharing solutions, including Dropbox, Google Drive, and Box, on-premises file sharing solutions give employees flexibility in how and from where they access work...
Blog

GDPR and its Relationship with Healthcare

What is GDPR? The General Data Protection Regulation (GDPR) establishes protections for the privacy and security of sensitive data for individuals in the European Union (EU). The data protection regulation was designed to harmonize data privacy laws throughout the EU and replaced the long-standing Data Protection Directive. GDPR...
Blog

Who is Protecting Your Healthcare Records?

Patient Privacy is in Jeopardy: Data Breaches, High Payouts, and PHIHow important is a patient's privacy? If your organization is a healthcare facility, the instinctive answer that comes to mind is "Very important!" After all, a patient's privacy is the basis upon which a doctor/patient relationship is based.Right?When it comes to patient data, the...
Blog

The Top 10 Healthcare Data Breaches of 2020

2020 Was the Worst – in Healthcare Data BreachesData breaches can have catastrophic consequences on those who are unfortunate enough to suffer from one. From steep costs and/or fines (in the millions) to a ruined reputation, data breaches are not to be taken lightly. This is especially true for the healthcare industry, where sensitive patient data, or...
Blog

How to Use MFT as a Workflow Automation Tool in Healthcare

When it comes to managed file transfer (MFT) solutions, organizations across industries find them valuable for policy enforcement, user access control and authorization, risk reduction, and more. And when it comes to HIPAA and HITECH requirements, MFT shines as a secure workflow automation tool. MFT as a B2B Enabler What makes MFT a perfect...
Blog

How Cloud Technology is Transforming the Healthcare Industry

When you think of files in healthcare, you may think of illegible doctor notes, clipboards with unpronounceable drugs, or a hastily printed summary of your visit. The healthcare industry generates a lot of paperwork that makes its way into many hands, so how can healthcare organizations keep it flowing to the right places – and do so securely? ...