Blog

Blog

Tainted Love, Ransomware, and More: This Month in Cybersecurity

  Image February, while a short month, was long on cybersecurity threats. Read on for a few of the high- (well, low-lights) as well as for some resources from GoAnywhere MFT on how you can help secure your sensitive data files while they are in motion and in transit. Love Hurts The search for love turned up more than potential...
Blog

HTTPS vs. SFTP: The Key Differences

  Image   What Are the Key Differences Between HTTPS and SFTP?   HTTPS and SFTP are both important protocols used for the act of sending data. However, there are innate differences between them. Read more for a look at the key differences between HTTPS and SFTP. What is HTTPS? HTTPS, or Hypertext Transfer Protocol Secure, is a...
Blog

How the Coronavirus Has Changed Data Security

  Image   COVID-19 Has Made a Lasting Impact on Data Security   The Coronavirus pandemic has altered many things in this world and data security is no exception. Along with the solid impact COVID-19 has made on data security, let’s highlight some of the other key ways lasting change has been made within businesses. The Lasting...
Blog

13 Essential MFT Blog Posts You Might Have Missed

  Image There’s a lot out there (and just on this website) about what MFT (managed file transfer) software is, why it’s a good FTP alternative, and how to choose the best file transfer software for your business. That’s why we’ve selected 13 of our top blogs that answer those exactly those questions – and more. And because questions...
Blog

Still WFH? Time to Revisit BYOD, Security, and More

  Image Work from home, which was once an early-pandemic precaution, is becoming a norm across industries. It is likely that the pandemic has shifted how people work forever, with half of employees expecting to work predominantly from home or in a hybrid home-and-office system going forward. However, just as in the early days of the...
Blog

What is Shadow IT and Why is it a Problem?

  Image   Shadow IT Doesn’t Lurk in the Shadows – it's Prevalent   Although it may seem foreign now, there was once a time when an organization’s IT department had complete and total control over the technology being used by the organization. Before software could be purchased, or before anyone clicked download, the IT Director’s...
Blog

The 10 Biggest Data Security Breaches of 2021

  Image   2021 Was Not Fun for Those Who Suffered a Data Breach   Although 2021 brought about many positive changes and more of a return to normalcy, it did not bring fun times for the many organizations who suffered from costly data breaches. With the numbers, costs, and impacts of a data breach on the rise, it’s important to do...
Blog

Looking to 2022: New Year, New Data Security Strategies

  Image 3 Data Centric Security Strategies for 2022 Despite massive growth in data security spending, the number of data breaches is increasing. With constant changes in how and where work is done—thanks in part to growth in both cloud computing and mobile device usage—the threats are changing, too. And so are the strategies taken...
Blog

Making MFT Work in Today's Enterprise

  Image One of today’s major IT challenges is the work of moving large amounts of data between systems and facilities, and doing so securely and economically. GoAnywhere, a secure data transit platform for Managed File Transfer (MFT), offers a solution. GoAnywhere provides autonomous control of a company’s data. The platform encrypts...
Blog

What is Mobile Malware?

  Image   Meet Mobile Malware   Mobile malware is a malicious kind of software that hackers use to specifically target and collapse operating systems on smartphones, tablets, and smartwatches in order to steal confidential data. Generally speaking, mobile devices aren’t as secure as computers. So, it’s not a stretch that the...
Blog

What is Encrypted File Sharing?

  Image What is Encrypted File Sharing? Whether you’re sending data back and forth for edits or accessing a shared document, file security is important. Encrypted file sharing is a method of securely exchanging data either internally or externally by encoding data and protecting its transmission. Data encryption uses algorithms to...
Blog

What is SOC 2 and Why it Matters for Security

  Image There are some things in life that should be a given: rollercoasters are inspected regularly, chefs wash their hands, and your organization’s file transfers are secure. That last is a little more nebulous to see immediate cause-and-effect (it’s not like your rollercoaster car rolling off the tracks or getting food poisoning!...
Blog

What is Zero Knowledge Encryption?

  Image What is Zero Knowledge Encryption? If zero knowledge means every piece of information is absolutely confidential, and all data remains only with the user of a software or service, how does zero knowledge apply to encryption? Zero knowledge encryption basically states that data is kept secure via a unique user or encryption...
Blog

What is the DROWN Attack?

  Image What is the DROWN Attack? The Decrypting RSA with Obsolete and Weakened eNcryption (DROWN) Attack is a serious vulnerability that affects HTTPS and other servers that rely on Secure Sockets Layer (SSL)/Transport Layer Security (TLS). Essentially DROWN is an attack vector that leverages a cross-protocol bug in servers...
Blog

Developing a Plan for Data Risk Management

  Image What is Data and Risk Management? Data and risk management encompasses the processes and procedures an organization follows to safeguard the data it collects and stores. Data is today’s biggest asset—and today’s biggest target. If your organization has data, no matter now little or how sensitive, it’s at risk for leakage,...
Blog

Is MFT Dead?

  Image As cybersecurity technology continues to advance, some might ask whether secure MFT is fading away as a viable option for organizations to use for their file transfer needs. If organizations do choose to utilize MFT for their secure file transfer purposes, they will certainly select the best MFT software they can. The bottom...
Blog

The Surprising Relationship Between Data Privacy Laws and File Sharing

  Image Location, location, location. Not just the mantra of realtors and would-be buyers – it’s also a concern for data security professionals world-wide. As cloud computing has ramped up across industries, the physical location of stored data has been called into question, alongside concerns stemming from data privacy laws. Read...
Blog

The 5 Biggest Cybersecurity Threats of 2022: How to Avoid Cybersecurity Attacks

  Image Cybersecurity is one of the biggest issues of our time. Organizations are gradually investing more and more into cybersecurity. Microsoft expects to be investing upwards of $1 billion a year on cybersecurity for the foreseeable future and they certainly won’t be the only organization to increase their spending. In 2019,...
Blog

How Windows Works with GoAnywhere MFT

  Image What is MFT? Managed file transfer, often shortened to MFT, is a category of software solutions that centralize and secure data movement. The majority of MFT solutions offer automation and encryption to simplify file transfers within organizations and to trading partners. Related Reading: What is MFT and How Does it Work? ...