Blog

Blog

The Top 7 Cybersecurity Strategies for Your Business in 2021

  Did you know that the average cost of a data breach is $3.92 million and almost 30% of all organizations will experience at least one breach over the next 24 months? Besides the immediate cost, such as data loss and regulatory fines, organizations also suffer from tarnished reputations, eroded customer trust, the cost of other remedial measures, and...
Blog

What is the Digital Charter Implementation Act?

    Introducing the Digital Charter Implementation Act, 2020   In November 2020, one of the biggest shakeups in the history of Canada’s privacy law, the Digital Charter Implementation Act (DCIA), was proposed and is currently on the horizon. The DCIA is composed of two separate Acts: The Consumer Privacy Protection Act (CPPA) and the Personal...
Blog

What is Cryptojacking?

    Cryptocurrency and Cryptojacking Make a Dangerous Pair   With the rise in popularity of cryptocurrencies (electronic money) and their increasing acceptance as a legitimate way to purchase goods and services online, it didn’t take long for cryptojackers or cryptohackers to begin devising their schemes to mine cryptocurrency from others; and it’s...
Blog

The State of Financial Services Cybersecurity

  From Robin Hood to Bonnie and Clyde to Equifax, banks and the finance industry have been in jeopardy since the beginning of recorded history. For one, banks and financial services are enticing targets. The promise of a big payout, whether by breaching the vault or ransoming sensitive personal data, is what keeps would-be bank robbers and cyber...
Blog

What is Computer Security Day?

    News Flash: It’s Computer Security Day!   Today, November 30, is Computer Security Day! These days, electronic devices like smartphones, tablets, and computers are a huge part of our everyday lives. They impact how we socialize, how we work, how we get around, and so much more. Although communication has become easier, efficient, and more...
Blog

Compliance for Healthcare: Secure File Transfer Holds the Key

  Complying with your doctor’s recommendations is the primary key to feeling good and staying healthy. Complying with the healthcare industry’s security standards and personal data protection requirements holds the key to avoiding an audit failure, paying steep fines, or trying to heal from the impact of a data breach. Sure, you can meet stringent...
Blog

Problems with FTP (And How to Solve Them)

FTP''s vulnerabilities make it unsuitable for most secure file transfer needs, including its lack of security features, unreliability, outdated processes, and more. There are better alternatives, including Managed File Transfer (MFT).
Blog

The Ultimate Checklist for Purchasing File Encryption Software

  Every organization needs to safeguard the data they collect, store, and share with customers, trading partners, and colleagues. Many choose file encryption software, which is one of the most straightforward ways to protect your data at rest and in motion. By using one of several complex algorithms, file encryption software encodes the contents of...
Blog

19 Ways to Transfer Big Files

  You have choices when it comes to sending large files. You can choose to take your chances with free file transfer solutions, but they can be risky. Using a managed file transfer (MFT) solution is a reliable way to secure your data and ensure it gets where it needs to be. Here’s a few ways you can get peace-of-mind when sending your big files. Send...
Blog

9 Mistakes You Might Make When Sending Big Files

  Sending that small file, or even a few small files, is a no-brainer at most organizations. But what about those massive, unwieldly and oh-so-sensitive files that inevitably get “stuck” or noted as “undeliverable.” You know the ones…those really important files that need to be somewhere yesterday! Without a company-approved file sharing method in...
Blog

What is File Encryption Software?

  File encryption software is a tool – either free or paid – that encodes your information so that it remains secure in motion, at rest, or both. Securing sensitive data is essential for any organization, and file encryption software does the heavy lifting. File encryption software uses one of several complex algorithms to scramble the contents of...
Blog

The Cybersecurity Dangers of the Dark Web and How to Protect Your Organization

  Even as cybersecurity experts and researchers declare that the “underground golden age is over” as its top marketplaces are raided or close their doors, the dark web continues to thrive. In fact, Darkode, one of the most well-known hacking forums and black markets, recently reopened. And what are some of the most common wares at these underground...
Blog

35 Cybersecurity Jokes to Make Any Security Geek Chuckle (or Groan)

  Good IT jokes are few and far between, especially when it comes to cybersecurity. That’s why we put on our creativity hats to brainstorm joke after joke – with a break to pull in a few of our favorites from the web – for the ultimate result: the motherlode (or should we say motherboard?) of cybersecurity jokes and puns. P.S.: we side with Alfred...
Blog

Why You Should Use File Encryption Software

    File Encryption Software is “Key”   What is the key to keeping your data safe? One word: Encryption. There’s no question that encrypting sensitive data at rest and in motion is essential when it comes to guarding against cyber threats and complying with local, national, or industry-standard requirements. However, if you’re still on the fence...
Blog

How Government Organizations Secure Data with GoAnywhere MFT

    GoAnywhere MFT is an Executive Option for Government Agencies   Government agencies face many significant regulations and security policies when it comes to protecting sensitive data year-round. GoAnywhere Managed File Transfer (MFT) protects data confidentiality in public sector organizations by helping agencies meet the strict requirements...
Blog

German DPAs Announce New Email Encryption Guidance

In May of 2020, substantial guidance on email encryption was issued by the German Data Protection Authorities (German DPAs) specific to personal data transferred via email. These guidelines recommend reducing the risks of a personal data breach with both end-to-end encryption and transport encryption. The new guidelines build on previous requirements,...
Blog

3 Lessons Learned from a Data Breach

  Data breaches have been plaguing organizations for years and the numbers continue to climb. After a breach, an organization goes into survival mode — trying to recover data, reestablish trust, and ensure they can keep their business running. It’s understandable that there isn’t much leisure time to sit back and reflect on what could have been done...
Blog

5 Ways to Tighten Cybersecurity Working from Home

  Logistically, you’re good to go: employees are working from their home offices, spare rooms, and kitchen counters as if they’ve always been doing it, IT is keeping things chugging along on the back end, and you’ve even ironed out the kinks in video call happy hours. Now that your employees can successfully work from home, it’s time to circle back and...
Blog

How to Help Ensure Compliance with Data Privacy Laws

  How to Help Ensure Compliance with Data Privacy Laws If complying with data privacy laws like the GDPR, PDPA, CPA, HIPAA, PCI DSS, PIPEDA, and more sometimes feels like swimming in alphabet soup, there is a life preserver that can simplify, secure, and automate the processes involved. Managed file transfer can proactively help organizations meet...
Blog

How Do I Securely Share and Send Large Files?

  The biggest danger of passing notes in grade school was interception by your teacher (or a box checked “no”) but sending large files these days carries a lot more risk. Messages that you’re sending in a work capacity likely contain information that’s more sensitive than schoolyard gossip or a question for your crush – and the person intercepting it...