Blog

Blog

How to Help Ensure Compliance with Data Privacy Laws

  How to Help Ensure Compliance with Data Privacy Laws If complying with data privacy laws like the GDPR, PDPA, CPA, HIPAA, PCI DSS, PIPEDA, and more sometimes feels like swimming in alphabet soup, there is a life preserver that can simplify, secure, and automate the processes involved. Managed file transfer can proactively help organizations meet...
Blog

How a Data Security Breach Puts Your Organization at Risk

  Data breaches are, unfortunately for organizations everywhere, becoming likely events rather than worst-case scenarios, as more and more organizations are learning. There are a variety of safeguards businesses can implement to reduce their risk, but even with good data security in place, a breach can happen. So, what do you do? And what is the...
Blog

What's the Difference? AS3 vs. AS4

  If you have ever delved into the Applicability Statement family tree, you may know that AS3 and AS4 don’t have much in common. But what makes these two ostensibly sequential protocols similar, and what sets them apart? And why aren’t they sequential, anyway? Read on to discover the key details that differentiate AS3 and AS4, and what makes them stand...
Blog

How GoAnywhere MFT Helps the Healthcare Industry Thrive

  GoAnywhere MFT is Just What the Doctor Ordered The healthcare industry is a complex system full of regulations to comply with and highly sensitive data to move from one location to the next. From dramatic cost cutting, to eliminating manual processes, to strengthening data encryption and more, GoAnywhere Managed File Transfer (MFT) is just what the...
Blog

Key Cybersecurity Takeaways from the EasyJet Data Breach

  A data breach can wreak financial and logistical havoc for companies who experience them, not to mention customers, employees, and others who depend on or work with the breached organization. And even though it seems like data breaches are becoming more pervasive, they continue to severely impact organizations’ carefully built reputations – and may...
Blog

How Encryption Works: Everything You Need to Know

  What is Data Encryption? Encryption is a method of encoding data (messages or files) so that only authorized parties can read or access that data. Encryption software uses complex algorithms to scramble the data being sent. Once received, the data can be decrypted using a key provided by the originator of the message. The effectiveness of...
Blog

Replace Your FTP Scripts to Increase Security

  One too many things has gone wrong: a file didn’t arrive at its destination and you’re not sure why; your developer is out of office and you need to make a small change to your file transfer script; you logged into five different tools to schedule a simple transfer. And suddenly you realize: the time has come to move away from FTP scripts. At one...
Blog

Benefits of Single Sign-on (SSO)

  More than one is usually a good thing. More french fries, more vacation days, more friends. More usernames and passwords? Not so much. Organizations are increasingly turning to single sign-on (SSO) to lessen the burden of employees needing to remember endless usernames and passwords to access all the applications, websites and data to do their daily...
Blog

What is the PDPC?

  Governments are taking more steps than ever to protect their citizens’ personal data online – and some have been doing so for longer than others. Singapore’s Personal Data Protection Commission (PDPC) was established in 2013, and since then has helped to foster privacy regulations for citizens of the Republic of Singapore. What is the PDPC? The...
Blog

How to Revamp Your Organization's Cybersecurity Program

  When cyberattacks and data breaches make the news, it’s usually because they’re at large companies like Facebook or healthcare organizations. But every organization, large or small, needs to be concerned about cybersecurity; hackers have begun to understand that, while smaller companies may have less data on hand, they may have access to covetable...
Blog

What is NIST?

  NIST, the National Institute of Standards and Technology, is a lab and non-regulatory federal agency of the U.S. Department of Commerce. Founded in 1901 as a tool to boost the U.S.'s global competitiveness, NIST fosters efforts to create standards across technology systems. Today, NIST continues to push for innovation in a variety of industries and...
Blog

What are the Secure Messaging Standards in Australia?

  Secure Messaging in Healthcare Healthcare is essential to live a healthy life, but it shouldn’t come at the expense of your privacy. Healthcare is an industry that will always be growing, which means that if your situation transitions to a place where you need to see a new doctor or a specialist, your very private and personal health records will...
Blog

What is Wrong With Free File Transfer?

  Free time! Free food! Free kittens! All great concepts, right? Free file transfers! Ummmm, not so much. The old adage, “If it sounds too good to be true, it probably is…” definitely holds when it comes to file transfers. After all, the data you send to third-parties, vendors, customers and even internal staff is priceless and, in the wrong hands,...
Blog

What is the California Consumer Privacy Act?

  The California Consumer Privacy Act (CCPA), the latest data privacy law in the Golden State, went into effect on January 1st, 2020. Some have compared it to the UK’s GDPR (General Data Protection Regulation), and they’re not far off – like the GDPR, the CCPA is intended to protect individuals’ private data by making data collection and usage more...
Blog

How Are Your Peers Utilizing Automation in GoAnywhere?

    The Uses are Endless It’s no secret that automation is a great way to boost your business. It can save time, money, and important resources. But how is it being used by your peers on a day-to-day basis? Read on for some examples straight from your peers’ own personal experiences automating their file transfer processes. Adams County, Colorado ...
Blog

Is Automation All It’s Cracked Up to Be?

  Automation is Key We’ve all had our moments of being skeptical when something sounds too good to be true. However, automation is no joking matter. Automation is a great way to boost your business by saving time, money, and important resources.       What is Automation? Automation is the use of electronics and/or computer-controlled...
Blog

Top Data Breaches of 2019: How You Can Minimize Your Risks

    Top Data Breaches of 2019: How You Can Minimize Your Risk   Your organization made the headlines! That’s great, right? Not if it’s because you had sensitive data breached. A data breach can wreak financial and logistical havoc for you, your customers, patients, employees, and others. More importantly, it can severely impact the reputation you’ve...
Blog

What is PIPEDA?

  PIPEDA, the Personal Information Protection and Electronic Documents Act, is a privacy law that applies to private-sector organizations and businesses throughout Canada. The goal of PIPEDA is to ensure that all provinces and territories protect personal data. This includes: Asking for and obtaining consent when an individual’s information is...
Blog

How Banks are Benefiting from MFT Integration

  Trying to integrate and tie diverse internal and external banking applications, branches, systems and trading partners together so they work seamlessly with internal and central banking applications can have your IT department constantly untangling complex knots to ensure transactions and information flows easily. There is a way to untangle this...
Blog

Real-Life Ways GoAnywhere Saves Your Peers Time, Money, and Resources

  It’s Time to Get Real Let’s be real – time, money, and resources are all equally valuable in the business world. If you’re looking for a solution that can help you substantially save all three in your everyday life, look no further than GoAnywhere. Time After Time Time after time, GoAnywhere can help you maximize the time you have and keep wasted...