Blog

Blog

19 Ways to Transfer Big Files

You have choices when it comes to sending large files. You can choose to take your chances with free file transfer solutions, but they can be risky. Using a managed file transfer (MFT) solution is a reliable way to secure your data and ensure it gets where it needs to be.Here’s a few ways you can get peace-of-mind when sending your big files.Send your...
Blog

What is File Encryption Software?

File encryption software is a tool – either free or paid – that encodes your information so that it remains secure in motion, at rest, or both.Securing sensitive data is essential for any organization, and file encryption software does the heavy lifting. File encryption software uses one of several complex algorithms to scramble the contents of your...
Blog

The Cybersecurity Dangers of the Dark Web and How to Protect Your Organization

Even as cybersecurity experts and researchers declare that the “underground golden age is over” as its top marketplaces are raided or close their doors, the dark web continues to thrive. In fact, Darkode, one of the most well-known hacking forums and black markets, recently reopened. And what are some of the most common wares at these underground...
Blog

35 Cybersecurity Jokes to Make Any Security Geek Chuckle (or Groan)

Good IT jokes are few and far between, especially when it comes to cybersecurity. That’s why we put on our creativity hats to brainstorm joke after joke – with a break to pull in a few of our favorites from the web – for the ultimate result: the motherlode (or should we say motherboard?) of cybersecurity jokes and puns. P.S.: we side with Alfred...
Blog

Why You Should Use File Encryption Software

File Encryption Software is “Key”What is the key to keeping your data safe? One word: Encryption. There’s no question that encrypting sensitive data at rest and in motion is essential when it comes to guarding against cyber threats and complying with local, national, or industry-standard requirements.However, if you’re still on the fence about file...
Blog

3 Lessons Learned from a Data Breach

Data breaches have been plaguing organizations for years and the numbers continue to climb. After a breach, an organization goes into survival mode — trying to recover data, reestablish trust, and ensure they can keep their business running. It’s understandable that there isn’t much leisure time to sit back and reflect on what could have been...
Blog

5 Ways to Tighten Cybersecurity Working from Home

Logistically, you’re good to go: employees are working from their home offices, spare rooms, and kitchen counters as if they’ve always been doing it, IT is keeping things chugging along on the back end, and you’ve even ironed out the kinks in video call happy hours. Now that your employees can successfully work from home, it’s time to circle back and...
Blog

How a Data Security Breach Puts Your Organization at Risk

Data breaches are, unfortunately for organizations everywhere, becoming likely events rather than worst-case scenarios, as more and more organizations are learning. There are a variety of safeguards businesses can implement to reduce their risk, but even with good data security in place, a breach can happen.So, what do you do? And what is the outcome...
Blog

How GoAnywhere MFT Helps the Healthcare Industry Thrive

GoAnywhere MFT is Just What the Doctor OrderedThe healthcare industry is a complex system full of regulations to comply with and highly sensitive data to move from one location to the next.From dramatic cost cutting, to eliminating manual processes, to strengthening data encryption and more, GoAnywhere Managed File Transfer (MFT) is just what the...
Blog

Key Cybersecurity Takeaways from the EasyJet Data Breach

A data breach can wreak financial and logistical havoc for companies who experience them, not to mention customers, employees, and others who depend on or work with the breached organization. And even though it seems like data breaches are becoming more pervasive, they continue to severely impact organizations’ carefully built reputations – and may...
Blog

Replace Your FTP Scripts to Increase Security

One too many things has gone wrong: a file didn’t arrive at its destination and you’re not sure why; your developer is out of office and you need to make a small change to your file transfer script; you logged into five different tools to schedule a simple transfer. And suddenly you realize: the time has come to move away from FTP scripts. At...
Blog

Benefits of Single Sign-on (SSO)

More than one is usually a good thing. More french fries, more vacation days, more friends. More usernames and passwords? Not so much.Organizations are increasingly turning to single sign-on (SSO) to lessen the burden of employees needing to remember endless usernames and passwords to access all the applications, websites and data to do their daily...
Blog

What is NIST?

NIST, the National Institute of Standards and Technology, is a lab and non-regulatory federal agency of the U.S. Department of Commerce. Founded in 1901 as a tool to boost the U.S.'s global competitiveness, NIST fosters efforts to create standards across technology systems. Today, NIST continues to push for innovation in a variety of industries and...
Blog

What are the Secure Messaging Standards in Australia?

Secure Messaging in HealthcareHealthcare is essential to live a healthy life, but it shouldn’t come at the expense of your privacy.Healthcare is an industry that will always be growing, which means that if your situation transitions to a place where you need to see a new doctor or a specialist, your very private and personal health records will need...
Blog

What is Wrong With Free File Transfer?

Free time! Free food! Free kittens! All great concepts, right? Free file transfers! Ummmm, not so much. The old adage, “If it sounds too good to be true, it probably is…” definitely holds when it comes to file transfers. After all, the data you send to third-parties, vendors, customers and even internal staff is priceless and, in the wrong hands...
Blog

What is the California Consumer Privacy Act?

The California Consumer Privacy Act (CCPA), the latest data privacy law in the Golden State, went into effect on January 1st, 2020. Some have compared it to the UK’s GDPR (General Data Protection Regulation), and they’re not far off – like the GDPR, the CCPA is intended to protect individuals’ private data by making data collection and usage more...
Blog

Top Data Breaches of 2019: How You Can Minimize Your Risks

Top Data Breaches of 2019: How You Can Minimize Your RiskYour organization made the headlines! That’s great, right? Not if it’s because you had sensitive data breached. A data breach can wreak financial and logistical havoc for you, your customers, patients, employees, and others. More importantly, it can severely impact the reputation you’ve so...
Blog

What is PIPEDA?

PIPEDA, the Personal Information Protection and Electronic Documents Act, is a privacy law that applies to private-sector organizations and businesses throughout Canada.The goal of PIPEDA is to ensure that all provinces and territories protect personal data. This includes:Asking for and obtaining consent when an individual’s information is initially...
Blog

How Banks are Benefiting from MFT Integration

Trying to integrate and tie diverse internal and external banking applications, branches, systems and trading partners together so they work seamlessly with internal and central banking applications can have your IT department constantly untangling complex knots to ensure transactions and information flows easily.There is a way to untangle this...
Blog

PDPA in Singapore Helps Protect Personal Data

What is the PDPA of 2012?The Personal Data Protection Act of 2012 (PDPA) is a law designed to regulate and enforce the proper collection, use, disclosure, and care of the personal data of citizens in the Republic of Singapore. The Personal Data Protection Commission (PDPC) is charged with establishing policies and for reviewing organizational actions...