Blog

Blog

User Sharing and Collaboration: Security Concerns, Risks, and How to Securely Collaborate

Collaboration in the WorkspaceSecure collaboration tools that permit the sharing of sensitive data between users are quickly gaining momentum in the world of technology and file transfer.Although there are many benefits to utilizing these tools in the workspace, with user sharing and secure collaboration comes security concerns and a variety of...
Blog

8 Surprising Ways to Use GoAnywhere's Secure Folders Module

What is Secure Folders? Secure Folders is a licensed module GoAnywhere MFT offers its users. It provides access to authorized files and folders on the server or network location through a HTTPS Web Client. However, it can do so much more with its array of features. Read on to learn 8 surprising ways to use GoAnywhere’s Secure Folders module....
Blog

Should You Use a File Sharing App?

Should You Use a File Sharing App?File sharing apps like Dropbox and Google Drive certainly have their appeal. They are user-friendly, often free, and do the job of getting information from one user to another. Until they don’t.Or, until your files are hacked, get into the wrong hands, live in infamy, have unrestricted access, or are manipulated...
Blog

What is Secure File Sharing?

What is Secure File Sharing?Secure is the operative word here. Dozens of applications allow you to transfer files – small to large – between different users or organizations. A secure file transfer solution, at its most basic, secures the movement of files while at rest and in transit confidentially – all within a protected mode.Secure file transfer...
Blog

Why Choose Managed File Transfer Over Free File Sharing Methods?

Why Choose Managed File Transfer?It’s no secret that many organizations struggle to fully protect the sensitive data their employees, customers, trading partners, and third-party vendors share.Free file sharing software and scripts are both common ways of transferring files, even though they’re not necessarily the most secure, can be complex, and lack...
Blog

What is a DMZ and Why Do You Need a DMZ Secure Gateway?

If you’ve watched a science-fiction movie about space travel, then you’ve likely seen some version of a scene in which an astronaut reenters their ship from the outside abyss. Because the ship exists as a haven from the dangerous environment of empty space, the astronaut cannot simply open the door and stroll directly into the cockpit. To do so would...
Blog

3 Ways Your Peers are Using Secure Forms

If you exchange any amount of sensitive information as paper documents, electronic PDFs, images, or spreadsheets, you know keeping track of data and ensuring it gets where it needs to go can be a challenge. And if you work with multiple parties to receive this information, like employees, vendors, clients, stakeholders, and trading partners, you also...
Blog

15 Ways to Avoid Document Chaos with Secure Forms

Vendors, employees, customers, and trading partners exchange an abundance of files every day, often by a variety of means including mail, email, telecomm apps like Skype, shared file storage like Dropbox or Google Drive, and sometimes even SMS. While documents are an inescapable reality for busy organizations, keeping track of this data can be...
Blog

5 Best Practices for IBM i File Transfers

Using IBM’s built-in FTP and Open SSH servers to transfer files to and from your IBM i systems can be time-consuming, if not simply riddled with fine details. From scripting knowledge to running specific (and sometimes obscure) commands, there’s a lot to consider—and the safety and integrity of your files is probably at the top of the list. ...
Blog

30 Ways to Simplify Life with Advanced Workflows

Are you using GoAnywhere’s Advanced Workflows yet? If not, you’re missing out. What are Workflows? Workflows are projects you can create in GoAnywhere MFT to define your file transfers and improve your business processes. Each project is able to contain multiple tasks that execute in a seamless end-to-end workflow. Pretty neat, right? Why Use...
Blog

How to Create a Cybersecurity Policy for Your Organization

The cyberattacks and data breaches that make the news are usually the ones that happen at big corporations like TJX or Home Depot. But every organization, large or small, needs to be concerned about cybersecurity.According to Security Magazine, the average cost of a data breach for a small business is between $36,000 and $50,000. And while the...
Blog

Truly Secure On-Premises Document Management for HR

HR departments receive, generate, and accumulate substantial volumes of documents such as job postings, employment applications, resumes, reference checks, testing data, personnel files, wage and hour records, payroll records, and disciplinary files. GoDrive by GoAnywhere is a secure file storage and collaboration solution that's ideally...
Blog

Meeting Compliance Regulations and Privacy Laws for Sensitive Data Transfers

Comply with Data Security Requirements Highly sensitive data is exchanged between organizations on a constant basis making data security compliance more vital than ever to keep communication flowing. For instance, if a business routinely transmits financial information to their bank including payroll direct deposits and ACH payments, these...