Blog

Blog

What is MFT and How Does It Work?

Compared to using a variety of standalone FTP and SFTP tools and scripts, managed file transfer (MFT) technology allows professionals to streamline how data is transferred. MFT helps organizations send and receive files in the cloud and across their private networks, create and control workflows, automate business processes, and centralize management from a single system. ...
Blog

7 Steps to Protect Yourself Against Corporate Spear Phishing

Anyone with an email account is used to spam. It happens one day: you get that first unsolicited email, and then a flood of ads, flash sale offers, and foreign bank transaction requests rushes into your inbox. In that moment, the battle for your virtual sanity begins. But while spam emails are mostly harmless—you tend to see them from a mile away and respond accordingly...
Blog

8 Ways to Protect Your Healthcare Organization from a Data Breach

In 2020, there were 642 data breaches of healthcare organizations. That’s a new record, up 25 percent from the previous year. In these breaches, the records of millions of Americans were exposed. These incidents occurred at all types of organizations in the industry, including clinics, insurance providers and their health system business associates.   If you’re in the...
Blog

Top Takeaways from the 2017 Cybersecurity Trend Report

Image Note from the Editor: This article shares highlights from an older report. For the latest on data security and best practices for keeping file transfers safe, visit our Data Security page or check out the latest additions to our blog.Do you ever wish you knew how other businesses are dealing with today’s security threats? The...
Blog

The State of File Transfer Security

Note from the Editor: This article shares highlights from an older report. For the latest on data security and best practices for keeping file transfers safe, visit our Data Security page or check out the latest additions to our blog. The 2017 Cybersecurity Trends Report was recently released by Crowd Research Partners. The report covers many aspects of cybersecurity...
Blog

Still Using SHA-1 to Secure File Transfers? It’s Time to Say Goodbye

  Image Securing information is rising in importance for organizations worldwide. Using outdated technology is extremely risky, yet many organizations continue to do so because of legacy systems that don’t allow them to upgrade, lack of resources and time to upgrade, or they are simply unaware of the risks. The commonly used SHA-1...
Blog

HIPAA Compliance: Guide Details How MFT Helps

  Image Are your file transfers HIPAA compliant? Is your healthcare organization at risk for fines, or worse - a data breach of sensitive patient information? Many healthcare IT teams meet these broad questions with unease. After all, the ramifications of a healthcare data breach can impact organizations and individuals for years to...
Blog

Why Healthcare Organizations Need a Secure Data Transfer Solution

The last few years were scary in terms of healthcare cybersecurity. A hack of Banner Health breached up to 3.7 million records. Another data breach at 21st Century Oncology resulted in multiple lawsuits being filed against the organization. When a third party gained unauthorized access to computer systems at Valley Anesthesiology and Pain Consultants, almost 900 thousand...
Blog

3 Steps to Safeguarding Company Data and Limiting Risk

  Image   Security professionals of today are inundated with headlines about the potential consequences of a data breach. Making headlines for a data breach can cost you – and more than just reparations or a fine. Data breaches are the worst of bad press and can impact your finances for years to come. As security...
Blog

OpenPGP, PGP, and GPG: What is the Difference?

  Image The privacy capabilities of encryption methods such as Pretty Good Privacy (PGP) allow organizations to achieve a hightened amount of data security and protection. There are various approaches and elements of comparison for these encryption methods, however, and each one comes with their own histories, features, and...
Blog

Keeping File Transfers Secure from Hackers and Cyber Threats

  Image Keep Your Files Secure In the battle to secure information, it helps to know a little bit about how it can be compromised. Using FTP is one way to expose critical vulnerabilities and can allow credentials to be hacked. However, these holes in security can also be easily closed if you know how. How Hackers Discover...
Blog

How to Solve 4 Common Email Security Challenges

  Image Yes. Emailing someone is still one of the easiest ways to share data. However, there are some important caveats to sharing files this way that can put your organization’s file transfers at risk. Email File Transfer Challenges These are the four big challenges that organizations should be aware of when transmitting files via...
Blog

FIPS 140-2 Plays Vital Government Business Role

  Image   What is FIPS 140-2? FIPS 140-2 is a standard with which cryptographic-based (encryption) security systems must comply when protecting sensitive data in U.S. government agencies and departments. This FIPS 140-2 standard also extends to other entities that may exchange sensitive data with the federal government, including...
Blog

How to Build a Framework for HIPAA and HITECH Compliance

  Image HIPAA, established in 1996, was signed into law to outline the appropriate ways to use and disclose patient health information. Read on to learn how to develop a HIPAA- and HITECH-compliant IT framework for your organization.   Why Does HITECH Exist? HITECH laws were enacted to up the ante on healthcare organizations to...
Blog

Addressing HIPAA and HITECH Compliance Challenges

  Image HIPAA and HITECH regulations were designed and enacted to increase the security surrounding personal health information from those who should not have access to it. Next to finance, the healthcare industry is one of the most regulated industries around. While debates on the cost, structure, and delivery of healthcare...
Blog

Are Insurance Companies Managing Their Risk of Data Breach?

  Image   Insurance companies are the experts at analyzing and managing risk. They identify, quantify, and set pricing based on the calculated costs of risk. Naturally, the higher the perceived risk, the higher the cost to mitigate the potential losses.   Yet, here is the irony. While those in the insurance industry excel at...
Blog

Are You Next in Line for a Data Breach?

  Image A Data Breach is Closer Than You Think As the percentage of data breaches increase, the risk of organizations losing your sensitive data also increases. No one wants to receive the news that some or all of their personally identifiable information (PII) was stolen. Sure, there are people who are victims of various phishing...
Blog

The Culture of Data Security

  Image Here at Fortra, we hear a lot of buzz about protecting both customer and company data, but it's alarming how many IT departments and enterprise users are still not protecting their data correctly. According to the Ponemon Institute, fewer than 50 percent of organizations have comprehensive encryption protection in place. ...
Blog

Meeting Compliance Regulations and Privacy Laws for Sensitive Data Transfers

  Image Comply with Data Security Requirements Highly sensitive data is exchanged between organizations on a constant basis making data security compliance more vital than ever to keep communication flowing. For instance, if a business routinely transmits financial information to their bank including payroll direct deposits and...