Blog

Blog

How Are Your Peers Utilizing Automation in GoAnywhere?

The Uses are EndlessIt’s no secret that automation is a great way to boost your business. It can save time, money, and important resources. But how is it being used by your peers on a day-to-day basis? Read on for some examples straight from your peers’ own personal experiences automating their file transfer processes.Adams County, ColoradoAdams...
Blog

Is Automation All It’s Cracked Up to Be?

Automation is KeyWe’ve all had our moments of being skeptical when something sounds too good to be true. However, automation is no joking matter. Automation is a great way to boost your business by saving time, money, and important resources. What is Automation?Automation is the use of electronics and/or computer...
Blog

What is PIPEDA?

PIPEDA, the Personal Information Protection and Electronic Documents Act, is a privacy law that applies to private-sector organizations and businesses throughout Canada.The goal of PIPEDA is to ensure that all provinces and territories protect personal data. This includes:Asking for and obtaining consent when an individual’s information is initially...
Blog

How Banks are Benefiting from MFT Integration

Trying to integrate and tie diverse internal and external banking applications, branches, systems and trading partners together so they work seamlessly with internal and central banking applications can have your IT department constantly untangling complex knots to ensure transactions and information flows easily.There is a way to untangle this...
Blog

Real-Life Ways GoAnywhere Saves Your Peers Time, Money, and Resources

It’s Time to Get Real Let’s be real – time, money, and resources are all equally valuable in the business world. If you’re looking for a solution that can help you substantially save all three in your everyday life, look no further than GoAnywhere. Time After Time Time after time, GoAnywhere can help you maximize the time you have and keep...
Blog

PDPA in Singapore Helps Protect Personal Data

What is the PDPA of 2012?The Personal Data Protection Act of 2012 (PDPA) is a law designed to regulate and enforce the proper collection, use, disclosure, and care of the personal data of citizens in the Republic of Singapore. The Personal Data Protection Commission (PDPC) is charged with establishing policies and for reviewing organizational actions...
Blog

7 Essential Resources on PCI DSS Security

Note from the Editor: This article was originally published in February 2017. It has been updated with resources current to PCI DSS version 3.2.1.Did you know that 80% of organizations are not compliant with PCI DSS requirements? That means, if you’re reading this, there’s a pretty good chance your company needs to make adjustments to ensure a fully...
Blog

Meeting IT Security and Compliance Requirements with GoAnywhere MFT

Meet your IT and compliance requirements easily with GoAnywhere MFT. GoAnywhere helps organizations and IT professionals comply with an array of strict regulations, methods, and technologies. To open a larger, clickable image, choose the "Download" option below.DOWNLOAD For more of an in-depth look into...
Blog

GDPR: Understanding the 8 Rights of Data Subjects

Find out what these new rights mean for your organization and how you can prepare. GDPR (General Data Protection Regulation) is the EU’s new legal framework that replaced the EU Data Protection Directive in May 2018. While the directive was merely a recommendation, GDPR carries the force of law. The purpose of GDPR is similar to...
Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll want to pay close attention...
Blog

I’ve Just Been Breached, Now What?

So, you think (or perhaps you know) you’ve been breached. It’s every organization’s nightmare, and you’re living it, facing local and federal fines, upset customers, public panic, and a loss of intellectual property. A breach can be a harrowing ordeal; if you’re not sure what to do immediately after discovering the breach, your situation can...
Blog

Automation Operations: 5 Benefits of Automation

Advantages of AutomationVisions of a mechanized world flourished long before the term "automation" was coined. The star of Westinghouse’s exhibit at the 1939 World’s Fair was Electro, a robot that could walk, talk, and count on its fingers. Sadly, Electro and his kind were little more than demonstrations of remote control by human operators. By the...
Blog

Everything You Need to Know about FTP Automation Software

So, you want to automate your FTP file transfers. Whether you send a dozen file transfers a week, hundreds a day, or even more, automation is a smart step for most businesses. The benefits are simple: automatic file transfers cut down on user errors, reduce or eliminate the need for scripts, free up manual time spent on creating and maintaining jobs,...
Blog

Public Defender’s Office Reduces Manual Data Entry with Secure File Transfer Software

Every organization has legacy processes. Manual data entry, file cabinets full of paper records, sensitive documents sent across the organization by email, or even file transfers sent via homegrown scripts or FTP—all these processes can cause more headaches than their worth. Unfortunately, implementing a new strategy to replace a legacy one isn...
Blog

10 Ways to Achieve Automatic File Transfers with GoAnywhere MFT

Here’s a fun fact: When it comes to streamlining file transfer processes, secure FTP automation software is the supporting sidekick to any IT or cybersecurity professional.Like Robin supports Batman and Hawkeye supports Marvel’s Avengers, automatic file transfer software can support your pursuit for top notch cybersecurity, compliance, and encryption...
Blog

How 3 Financial Institutions Solve File Transfer Needs with MFT Software

On a scale of 1-10, how would you rate the efficiency of your file transfers right now?If you use manual scripts, legacy software, or a myriad of free tools to balance your encryption, automation, cybersecurity, reporting, and collaboration needs, it’s possible you’ll rate your efficiency low on the scale. After all, professionals in banking and...
Blog

IT Pros in Healthcare: How to Choose a Secure File Transfer Solution

Every healthcare provider wants to avoid being the next data breach headline—and unfortunately, we have seen many incidents and their consequences in 2018 so far. The causes of these data breaches range from wrongly configured databases to successful malware attacks and unauthorized user access.For those looking to avoid the pain, embarrassment, and...
Blog

Understanding the GDPR (General Data Protection Regulation)

Note from the Editor: This is an older resource on GDPR. For more on the latest GDPR resources, check out our GDPR resource page.IntroductionWhat is the GDPR?GDPR and the Data Protection Directive2018: The Year of GDPRGDPR and BrexitGDPR Fines and PenaltiesHow to Prepare for the GDPRGDPR and the CloudGDPR Compliant File TransfersIntroductionThe...
Blog

USPS Eliminates FTP, Requires Secure File Transfers

Early this year, the United States Postal Service (USPS) announced the elimination of FTP (File Transfer Protocol) from their business practices and policies—a change that strengthens the security of their data transmissions and addresses recent audit findings.What does this mean for you?The change is still in transition for now, but after August 31, 2017, mailers and shippers will need to send...
Blog

HIPAA Compliance: Guide Details How MFT Helps

Are your file transfers HIPAA compliant? Is your healthcare organization at risk for fines, or worse - a data breach of sensitive patient information? Many healthcare IT teams meet these broad questions with unease. After all, the ramifications of a healthcare data breach can impact organizations and individuals for years to come as well as have...