Blog

Blog

TFTP vs. SFTP: The Key Differences

  Image What do “T” and “S” have in common? If you add them to FTP you can create an entirely new protocol! FTP + S becomes either SFTP or FTPS, and by adding a second “T,” you get TFTP (Trivial File Transfer Protocol). While FTP isn’t recommended for transferring files securely, SFTP and FTPS are solid replacement choices – but...
Blog

Why You Should Use File Encryption Software

  Image   File Encryption Software is “Key”   What is the key to keeping your data safe? One word: Encryption. There’s no question that encrypting sensitive data at rest and in motion is essential when it comes to guarding against cyber threats and complying with local, national, or industry-standard requirements. However, if you...
Blog

German DPAs Announce New Email Encryption Guidance

Image In May of 2020, substantial guidance on email encryption was issued by the German Data Protection Authorities (German DPAs) specific to personal data transferred via email. These guidelines recommend reducing the risks of a personal data breach with both end-to-end encryption and transport encryption. The new guidelines build...
Blog

3 Lessons Learned from a Data Breach

  Image Data breaches have been plaguing organizations for years and the numbers continue to climb. After a breach, an organization goes into survival mode — trying to recover data, reestablish trust, and ensure they can keep their business running. It’s understandable that there isn’t much leisure time to sit back and reflect on...
Blog

5 Ways to Tighten Cybersecurity Working from Home

  Image Logistically, you’re good to go: employees are working from their home offices, spare rooms, and kitchen counters as if they’ve always been doing it, IT is keeping things chugging along on the back end, and you’ve even ironed out the kinks in video call happy hours. Now that your employees can successfully work from home, it...
Blog

How a Data Security Breach Puts Your Organization at Risk

  Image Data breaches are, unfortunately for organizations everywhere, becoming likely events rather than worst-case scenarios, as more and more organizations are learning. There are a variety of safeguards businesses can implement to reduce their risk, but even with good data security in place, a breach can happen. So, what do you...
Blog

What's the Difference? AS3 vs. AS4

  Image If you have ever delved into the Applicability Statement family tree, you may know that AS3 and AS4 don’t have much in common. But what makes these two ostensibly sequential protocols similar, and what sets them apart? And why aren’t they sequential, anyway? Read on to discover the key details that differentiate AS3 and AS4,...
Blog

Key Cybersecurity Takeaways from the EasyJet Data Breach

  Image A data breach can wreak financial and logistical havoc for companies who experience them, not to mention customers, employees, and others who depend on or work with the breached organization. And even though it seems like data breaches are becoming more pervasive, they continue to severely impact organizations’ carefully...
Blog

Top 3 Things to Look for in a Remote Collaboration Tool

  Image   Feel Like You're Working Together — Even From Apart Finding the best way to securely collaborate on and share files can be difficult in the best of times. With large swathes of people working from home for the first time, finding the solution that meets your business requirements is paramount. Content collaboration...
Blog

How Encryption Works: Everything You Need to Know

Image   What is Data Encryption? Encryption is a method of encoding data (messages or files) so that only authorized parties can read or access that data. Encryption software uses complex algorithms to scramble the data being sent. Once received, the data can be decrypted using a key provided by the originator of the message. The...
Blog

Replace Your FTP Scripts to Increase Security

  Image One too many things has gone wrong: a file didn’t arrive at its destination and you’re not sure why; your developer is out of office and you need to make a small change to your file transfer script; you logged into five different tools to schedule a simple transfer. And suddenly you realize: the time has come to move away...
Blog

Benefits of Single Sign-on (SSO)

  Image More than one is usually a good thing. More french fries, more vacation days, more friends. More usernames and passwords? Not so much. Organizations are increasingly turning to single sign-on (SSO) to lessen the burden of employees needing to remember endless usernames and passwords to access all the applications, websites...
Blog

How to Revamp Your Organization's Cybersecurity Program

  Image When cyberattacks and data breaches make the news, it’s usually because they’re at large companies like Facebook or healthcare organizations. But every organization, large or small, needs to be concerned about cybersecurity; hackers have begun to understand that, while smaller companies may have less data on hand, they may...
Blog

What is Wrong With Free File Transfer?

  Image Free time! Free food! Free kittens! All great concepts, right? Free file transfers! Ummmm, not so much. The old adage, “If it sounds too good to be true, it probably is…” definitely holds when it comes to file transfers. After all, the data you send to third-parties, vendors, customers and even internal staff is priceless...
Blog

What's the Difference Between AS2, AS3, and AS4?

  Image If you think these three protocols are simply sequential updates from the 1990s’ AS1 protocol you’d be mistaken. Each protocol brings its own distinct features to the data transmission table. Here’s a few key differences between them. What is AS2? AS2 (Applicability Statement 2) is a protocol specification used to transmit...
Blog

Going Beyond File Transfer

  Image Intergalactic – or at least global – organizations of all sizes use GoAnywhere MFT to securely transfer data while saving time, money, and valuable resources. But moving files from one place to another is just the start of the GoAnywhere adventure. GoAnywhere MFT has built-in elements that anyone can access from their first...
Blog

Top Data Breaches of 2019: How You Can Minimize Your Risks

  Image   Top Data Breaches of 2019: How You Can Minimize Your Risk   Your organization made the headlines! That’s great, right? Not if it’s because you had sensitive data breached. A data breach can wreak financial and logistical havoc for you, your customers, patients, employees, and others. More importantly, it can severely...
Blog

Resolve to Make Files More Secure in the New Year

  Image   Make Resolutions - AND Keep Them Resolutions. Every year you make them. Every year you break them. Make 2020 the year you finally resolve to make your file transfers more secure. Do it — even if you’re a stranger to the gym, you still sport those extra 10 pounds and haven’t called your mom in a week. Don’t wait until mid...
Blog

Comparing Transfer Methods: HTTP vs. FTP

Image   HTTP vs. FTP for File Transfer Hyper Text Transfer Protocol (HTTP) and File Transfer Protocol (FTP) are both application layer protocols that can allow you to transfer files between two systems, but what’s the difference between them – and which one performs better? Or, is there a better solution that outperforms both? Read...
Blog

SCP vs. SFTP: Which is Better?

  Image The Secure File Sharing Matchup: Differences Between SFTP and SCP When sizing up SFTP vs. SCP you’ll find that the two file sharing protocols are quite similar. And, for some file transfer situations, they could be nearly interchangeable. Your need for speed, functionality and security will determine which protocol is best...