Blog

Blog

Why Fast File Transfer will be Invaluable for Sports Broadcasters in the 2022 World Cup

The World Cup is the most-watched sporting event on the planet. The 2018 World Cup in Russia saw a record-breaking audience of 3.5 billion people, and the upcoming 2022 version hosted by Qatar is expected to be watched by five billion people. For sports broadcasters and media outlets, it is a hugely busy but rewarding time. It is an event that provides so much content to drive and engage...
Blog

Implementing File Transfer Strategies for Cybersecurity

So, you did your legwork and identified your cybersecurity needs around transferring files securely. You found your best secure file transfer solution by checking out a few top choices based on reviews, trials and maybe even a demo or two. And now that you’ve got the green light for your chosen secure file transfer solution, it’s time to put it to...
Blog

What Your Organization Needs to Know About Secure File Transfer

It’s safe to say that the last few years have significantly increased the demand for Secure File Transfer (SFT) solutions such as GoAnywhere MFT. When the pandemic made vast numbers of the working population work from home almost overnight, there was a sudden spike in the requirement for robust and effective SFT. People needed to share documents...
Blog

Overcome the Limits of Email Attachments with FileCatalyst

“Email too large.” That dreaded bounceback message you get after sending an important email with a large attachment can be avoided. Most email systems impose a strict 25 MB size limitation on attachments. That just doesn’t cut it today, with hundreds of data-rich large files, videos, and more needing to be exchanged throughout the day. There is a way to ensure that your large attachments make...
Blog

Are SSH and SFTP the Same?

Are SSH and SFTP the Same?SSH and SFTP are a classic pair. They intertwine when it comes to securing communication, and while they have similar capabilities, they are not the same thing. So, what’s the difference between them? Read on to find out. What is SSH?Secure Shell (SSH) is a transport layer that is used to secure...
Blog

What is High Latency File Transfer and Why Should You Use It

When taking off on a vacation, the less time spent traveling the better, right? A non-stop flight, versus one with iffy connections and layovers is the way to go whenever possible. There are fewer hiccups, and the overall experience is simply better. File transfers operating in a high latency network can be a bit like that multi-stop flight, with delays, missed connections, and a general bog down...
Blog

This Month in Cybersecurity: The Weather is Heating Up and So Are Cyberattacks

At the time of writing, much of Europe and the U.S. is in the midst of a major heatwave, delivering record temperatures and concerns about climate change. Just as the heat is rising, so is the threat of cyberattacks. New data has emerged that reveals 2022 is looking like it could be the worst year ever for cybersecurity in terms of the volume...
Blog

4 Ways You Can Use Your Digital Rights Management Tool

In an increasingly collaborative work environment, it’s more important now than ever before that your organization has the highest level of visibility and control possible over its data. While knowing how to choose the right data security solutions such as managed file transfer, data classification, and more is a challenge in and of itself,...
Blog

Common Questions About Fast File Transfer

There is no doubt we live in an information-intensive world, one in which getting the right data quickly is often pivotal to an organization’s success. Moving files from point A to point B requires many considerations, but when it comes to large, mission-critical files that need to reach recipients around the world as fast as possible, it’s time to move beyond options such as Dropbox and Google...
Blog

Largest Data Breaches in Last 10 Years

Bigger is often better. A bigger slice of pizza or a bigger paycheck sounds pretty nice. An extra-large data breach, not so much.Listing out the biggest data breaches of all time can be challenging, as the next big one could be right around the corner. At the time of this writing, reports are out that the Personally Identifiable Information (PII) of 1...
Blog

Lessons Learned from the REvil Ransomware Attack of 2021

Fireworks lighting up the sky, the smell of backyard grills cranking out delicious food, and organizations reeling from massive global cyberattacks. Aaah….those not-so-sweet memories of that first weekend in July 2021, when hundreds of businesses were smacked with the financial, logistical, and reputational ramifications of ransomware attacks. ...
Blog

This Month in Cybersecurity: Summer is Here, but There’s No Vacation From Cyberattacks

June generally marks the start of summer, although anyone thinking the cyber criminals will take a few months off should probably think again. Not only has one of most sacred of summer institutions – Wimbledon – been subject to a threat, but fresh attacks and threats emerged all over the world. It’s clear that organizations must remain vigilant...
Blog

What is the Smominru Botnet?

What is the Smominru Botnet? Though its origins date back to 2017, Smominru is a dangerous botnet that has been making headlines recently as it continues to spread, attacking targets in every industry. Smominru, which also operates under known variants like including Hexmen and Mykings, has infiltrated hundreds of thousands of machines,...
Blog

Secure File Sharing for Banks Gets a Boost from GoAnywhere MFT

Secure file sharing for banks has always been of utmost importance and is only gaining traction in the face of common cybersecurity threats and compliance requirements alike. Requirements like PCI DSS, GDPR, GLBA, and more can make processes more complicated, even as the safeguards outlined within them promote data security to protect both...
Blog

What is Ransomware and How to Detect and Prevent It

What is Ransomware?Let’s start with the basics. The simple definition of ransom is “a consideration paid or demanded for the release of someone or something from captivity.” Ransomware, then, is a way for bad actors to encrypt information and hold it ransom in exchange for money—typically untraceable bitcoin.There are four main ways that hackers...
Blog

Ship to Shore Fast File Transfer: 3 Offshore Fleet Communication Case Studies

Data transfer has hurdles for any industry, but remote file transfer from ship to shore must overcome additional obstacles. Even as data collection tools become more powerful and generate bigger datasets than ever before, transfer tools have improved at a slower pace, and are not often built with mid-ocean data transfer in mind. Discover how three organizations avoided this common pitfall with...
Blog

Why it’s Time to Adopt Zero Trust Architecture

If you work in cybersecurity, the chances are that you will have come across the phrase Zero Trust over the past few years. It’s become a real industry buzzword, but there is substance behind the noise on this occasion. To the outsider, it’s a term that is easy to misinterpret. It sounds draconian and severe and could be perceived as...
Blog

A Ransomware Special - WannaCry’s Anniversary and More: This Month in Cybersecurity

May’s ‘this month in cybersecurity’ is somewhat of a ransomware news special. In addition to a ransomware attack on Costa Rica and the continued expansion of BlackByte, this month also marks the fifth anniversary of WannaCry, perhaps the most damaging malware attack the world has seen.Ransomware remains hugely prevalent, but is an attack likely to...
Blog

NAB Show Recap: The Power of Fast File Transfer in Media and Broadcast

Global Visionaries Converged at the 2022 NAB Show The recent annual NAB Show was, as usual, a fantastic event to get a bead on industry happenings and meet the movers and shakers pushing our notions of what’s possible. The event attracts media, entertainment, and technology companies looking level up the process of creating and distributing content for global audiences. NAB announced that this...
Blog

What is Ryuk Ransomware?

The last few years have seen a rise in stories about Ryuk, a powerful piece of ransomware that is best known for targeting healthcare institutions, but has also been attacking municipal governments, state courts, enterprises, and large universities, among others. Many of these organizations have paid hefty fees – between $100,00 and $500,000,...