Blog

Blog

Replace Your FTP Scripts to Increase Security

  One too many things has gone wrong: a file didn’t arrive at its destination and you’re not sure why; your developer is out of office and you need to make a small change to your file transfer script; you logged into five different tools to schedule a simple transfer. And suddenly you realize: the time has come to move away from FTP scripts. At one...
Blog

Benefits of Single Sign-on (SSO)

  More than one is usually a good thing. More french fries, more vacation days, more friends. More usernames and passwords? Not so much. Organizations are increasingly turning to single sign-on (SSO) to lessen the burden of employees needing to remember endless usernames and passwords to access all the applications, websites and data to do their daily...
Blog

What is Wrong With Free File Transfer?

  Free time! Free food! Free kittens! All great concepts, right? Free file transfers! Ummmm, not so much. The old adage, “If it sounds too good to be true, it probably is…” definitely holds when it comes to file transfers. After all, the data you send to third-parties, vendors, customers and even internal staff is priceless and, in the wrong hands,...
Blog

Top Data Breaches of 2019: How You Can Minimize Your Risks

    Top Data Breaches of 2019: How You Can Minimize Your Risk   Your organization made the headlines! That’s great, right? Not if it’s because you had sensitive data breached. A data breach can wreak financial and logistical havoc for you, your customers, patients, employees, and others. More importantly, it can severely impact the reputation you’ve...
Blog

7 Essential Resources on PCI DSS Security

  Note from the Editor: This article was originally published in February 2017. It has been updated with resources current to PCI DSS version 3.2.1. Did you know that 80% of organizations are not compliant with PCI DSS requirements? That means, if you’re reading this, there’s a pretty good chance your company needs to make adjustments to...
Blog

Need a Cloud-Based MFT Environment? Try a Hybrid Cloud Setup

  Cloud integration is growing in popularity, but committing 100% to the cloud isn’t always practical or secure for organizations. If you’re in the market for cloud-based solutions, read our quick overview below. For a more comprehensive exploration of when to choose a hybrid cloud and how keep your data encrypted through and after the transition to a...
Blog

What are SFTP Servers?

    What are SFTP Servers? A typical file transfer server helps transfer files server-to-server or client-to-server, and SFTP servers are a more protected version: they encrypt data to keep sensitive information secure while moving files, and some have the added bonus of encrypting files at rest. SFTP servers use a single data channel in which login...
Blog

Open PGP and GoAnywhere MFT: What You Need to Know

        Which Solution is Right for You? Open PGP vs. GoAnywhere MFT If you have sensitive files that need to get from point A to Point B securely, you may have considered utilizing Open PGP or a managed file transfer solution, like GoAnywhere MFT. Do you know which option is the best fit for your organization? What is Open PGP? Open PGP is an...
Blog

Which is Better? - AS2 vs. AS4

    AS2 vs. AS4   AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and which of the two is better? What is AS2? AS2 (Applicability Statement 2) is a protocol specification that’s used to transmit sensitive data securely...
Blog

Think Your Customer Data was Exposed? Follow These Steps

  When a prospect or customer shares personal data with a business, they expect their information will be stored securely, kept safe from vulnerabilities, and used only for the purposes with which it was collected. Whether this data is an email address, a birthday, a personal identifier, or credit card numbers, the weight of trust placed on this...
Blog

7 Benefits of Using MFT for Encrypted File Transfers

    7 Benefits of Using MFT for Encrypted File Transfers   At minimum, a managed file transfer (MFT) solution is a product that encompasses all aspects of inbound and outbound file transfers while using industry-standard network protocols and seamless encryption. It can automate and transfer data across your network, systems, applications, trading...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

  If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want it to include a key...
Blog

How to Prevent Data Breaches with MFT | Checklist and Plan

  You know what a data breach looks like in the movies... A character’s computer is suddenly overtaken by lines of green code. Windows and browsers pop up at lightning speed, as if the PC is possessed and has its finger on the fast-forward button. The main characters give each other horrified looks. "We’re being hacked!" a side character shouts, and...
Blog

Why You Should Incorporate Managed File Transfer into Your Cybersecurity Strategy

  Managed File Transfer: A New Cybersecurity Strategy for Sensitive Files Earlier this month, independent news platform Patch reported that Neiman Marcus, a department store chain in the US, has finally agreed to a settlement for their 2014 data breach. They’ll need to "pay $1.5 million and adopt measures to prevent hacks," measures that include the...
Blog

Data Breach and Incident Response Plans | 2019 Templates & Best Practices

  Every year, organizations hope that statistics for data breaches will improve, that things will be better than the year before. And every year, they are dismayed to discover that even though they’re pulling in new cybersecurity tactics to thwart cyber attacks, so are hackers pulling in new methods to discover their organizations’ weakest...
Blog

The Best Cybersecurity Strategies for Banks and Financial Organizations

  Banks and financial institutions, take note: though the year is almost over, no one is safe from a data breach. Industries across the board have seen 4.5 million records stolen so far in 2018—a staggering 133% increase over those compromised in 2017. As you create updated cybersecurity plans and data breach prevention strategies for the new year, it...
Blog

Why You Should Cluster Your File Transfer Systems

  What’s the true cost of downtime for your organization? You may think of it in terms of lost revenue—according to studies released in the last couple years, the average cost of system-wide downtime is $100,000 an hour, and that’s on the low end (it can get up to $300,000 or more). But there are other factors involved in the price of downtime that can...
Blog

Is Your Data REALLY Safe on the IBM i (AS/400)?

  “AS/400 is built to be safe and reliable.” “No one makes viruses for the IBM i. There are no known cases of malware, either.” “IBM has amazing IBM i server security, so we don’t have to worry about vulnerabilities.” Do these statements sound familiar? Perhaps you’ve come across these claims in the industry, heard someone say something similar at...
Blog

5 Ways to Protect Your Financial Organization from a Data Breach

  While several industries, including business and education, make up a big portion of yearly data breach counts, banks and credit unions aren’t left risk free. According to the Identity Theft Resource Center (ITRC), the banking/credit/financial sector totals 5.8% of 2017’s data breaches as of June 30, 2017. That’s up two percent from 2016’s first half...
Blog

Data Breach and Incident Response Plans | 2017 Templates & Resources

As we continue to put our data online, through social media channels, cloud storage, and email attachments, we open ourselves up to the possibility of data breaches and other attacks. The answer to this problem isn’t to stop using the internet, of course. But organizations today need to pay serious attention to their cybersecurity gaps, put guidelines...