Blog

Blog

What are the Secure Messaging Standards in Australia?

  Image Secure Messaging in Healthcare Healthcare is essential to live a healthy life, but it shouldn’t come at the expense of your privacy. Healthcare is an industry that will always be growing, which means that if your situation transitions to a place where you need to see a new doctor or a specialist, your very private and...
Blog

What is the California Consumer Privacy Act?

  Image The California Consumer Privacy Act (CCPA), the latest data privacy law in the Golden State, went into effect on January 1st, 2020. Some have compared it to the UK’s GDPR (General Data Protection Regulation), and they’re not far off – like the GDPR, the CCPA is intended to protect individuals’ private data by making data...
Blog

What is PIPEDA?

  Image PIPEDA, the Personal Information Protection and Electronic Documents Act, is a privacy law that applies to private-sector organizations and businesses throughout Canada. The goal of PIPEDA is to ensure that all provinces and territories protect personal data. This includes: Asking for and obtaining consent when an...
Blog

How Banks are Benefiting from MFT Integration

  Image Trying to integrate and tie diverse internal and external banking applications, branches, systems and trading partners together so they work seamlessly with internal and central banking applications can have your IT department constantly untangling complex knots to ensure transactions and information flows easily. There is a...
Blog

PDPA in Singapore Helps Protect Personal Data

  Image What is the PDPA of 2012? The Personal Data Protection Act of 2012 (PDPA) is a law designed to regulate and enforce the proper collection, use, disclosure, and care of the personal data of citizens in the Republic of Singapore. The Personal Data Protection Commission (PDPC) is charged with establishing policies and for...
Blog

7 Essential Resources on PCI DSS Security

  Image Note from the Editor: This article was originally published in February 2017. It has been updated with resources current to PCI DSS version 3.2.1. Did you know that 80% of organizations are not compliant with PCI DSS requirements? That means, if you’re reading this, there’s a pretty good chance your company needs to...
Blog

Should You Get Extended Customer Support? FileCatalyst’s Top 3 Reasons Why It’s Worth It

Whether you are purchasing the next trending iPhone or a powerful fast file transfer solution, support is always a bonus feature that provides you a team in your back corner. This sense of security takes a weight off of your shoulders because you know that assistance will be there to alleviate the stress that comes with updates, crashes, and more. Support is undervalued...
Blog

Netflix Series Black Mirror, Highlights Data Protection– 3 Reasons Why You Should Listen

For good or for bad, the popular NetFlix television show, Black Mirror has global audiences overwhelmed with the future possibilities for technology. The show’s creators appear to have sought out the most extreme plotlines around technological threats, leaving us with digital nightmares. While Black Mirror mainly tackles the negative aspects of the potential advancement in...
Blog

Meeting IT Security and Compliance Requirements with GoAnywhere MFT

  Image Meet your IT and compliance requirements easily with GoAnywhere MFT. GoAnywhere helps organizations and IT professionals comply with an array of strict regulations, methods, and technologies. To open a larger, clickable image, choose the "Download" option below. DOWNLOAD   Image ...
Blog

GDPR: Understanding the 8 Rights of Data Subjects

Image Find out what these new rights mean for your organization and how you can prepare.   GDPR (General Data Protection Regulation) is the EU’s new legal framework that replaced the EU Data Protection Directive in May 2018. While the directive was merely a recommendation, GDPR carries the force of law. The purpose...
Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

  Image   Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020 Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll...
Blog

I’ve Just Been Breached, Now What?

  Image So, you think (or perhaps you know) you’ve been breached. It’s every organization’s nightmare, and you’re living it, facing local and federal fines, upset customers, public panic, and a loss of intellectual property. A breach can be a harrowing ordeal; if you’re not sure what to do immediately after discovering the breach,...
Blog

How 3 Financial Institutions Solve File Transfer Needs with MFT Software

  Image On a scale of 1-10, how would you rate the efficiency of your file transfers right now? If you use manual scripts, legacy software, or a myriad of free tools to balance your encryption, automation, cybersecurity, reporting, and collaboration needs, it’s possible you’ll rate your efficiency low on the scale. After all,...
Blog

High-Performance Computing (HPC) in Oil & Gas

When it comes to the digital oilfield, High-Performance Computing (HPC) is an asset to be relied upon. From upstream discovery and the mapping of ocean floors to production, optimization and design; powerful HPC systems are analyzing, interpreting and manipulating unfathomable amounts of data. FileCatalyst has been helping a number of natural resources companies accelerate...
Blog

AI Across Industries – Where We Are, Where We’re Going

HAL 9000 might be closer, more useful and friendlier than we think. Artificial Intelligence (AI) might not be here in a fully realized form yet, but it’s already disrupting a lot of industries that we work in. As our customers discuss, question and evaluate the ways they can leverage AI to help streamline their workflows, I thought that I’d share some of the ways industry...
Blog

IP-Based Workflows – The Paradigm is Shifting, are You on Board?

Since returning from IBC 2018, I have been thinking about IP-based workflows and the great discussions we had about this emerging trend at our booth. While IP-based workflows are seeing increased adoption and bringing new opportunities, there are also challenges ahead. IP-based workflows aren’t exactly new, but adoption has greatly increased in the media space as of late....
Blog

Chris Speaks at IABM: How Far Can We Go With The Cloud?

This year was another successful IBC for FileCatalyst, and we thank everyone who visited us. Our booth was bustling with activity; from people asking questions about how our fast file transfer solutions can fit in their workflow to people engaged with our in-depth demos that walked them through the user experience firsthand. Big thanks to every attendee that stopped by our...
Blog

Making Sense of the Numbers: Breaking Down Our Speed Chart

Image FileCatalyst World Speed ChartWhen we attend trade shows, like the IBC Show on the horizon, our FileCatalyst World Speed Chart always garners attention and starts conversations at our booth. The question people always ask about it is, “How?” And I can’t blame them. To take a file that would usually take five hours to transfer,...
Blog

There are Threats to FTP Servers, are You Mitigating Them?

I just finished reading an article by Marianne Kolbasuk McGee about the threats facing healthcare companies when it comes to FTP servers. I thought it would be a good idea to outline these threats, provide some thoughts, and outline some of the ways FileCatalyst addresses them. The State of FTP Servers The FBI has warned the healthcare sector that the File Transfer Protocol ...
Blog

Using FileCatalyst to Remedy Healthcare IT Issues

When it comes to healthcare, file transfers aren’t something to be left to Dropbox or FTP email attachments. The requirements are many; files must remain confidential, visible, and secure – every time. Achieving this is becoming ever more challenging as the sheer size and volume of file transfers grow with every year. I came across an interesting article titled “7 File Transfer...