Blog

Blog

ModernCTO Podcast with Chris Spargen - Seamless Managed File Transfer

Chris Spargen , Senior Solutions Engineering Manager for HelpSystems (now Fortra) , was recently featured on the ModernCTO Podcast . In the interview, Spargen discusses how MFT technology has rapidly evolved to be more user friendly and how the company’s MFT solutions can secure, automate , and encrypt file transfers in an ever-increasing threat environment . Listen below:
Blog

What Makes Audio and Music Files So Big?

If a tree falls in a forest, does it make a sound? Yes, but without the right tools to capture, process, and send the sound, no one will ever know. The same goes for any audio file: even with the right tools, it’s nearly impossible to capture, process, and send a sound with 100 percent accuracy. And even with the right tools, certain choices you make can sacrifice sound quality. Sound has been an...
Blog

Shadow IT and Work From Home: The Risks and Solutions

Working 9 to 5 is no longer the only way to make a living, and for the foreseeable future, organizations parking most of their employees at a particular desk Monday through Friday is looking less and less likely. Working from home, at least as part of a hybrid organizational structure, is here to stay. Whether working from home, in a hybrid situation, or back in that old familiar office chair...
Blog

What is HITRUST Compliance?

HITRUST Compliance Helps to Manage Risk The secure storage and transfer of sensitive data is of the utmost importance to the healthcare industry. Data security and complying with the Health Insurance Portability and Accountability Act (HIPAA) is paramount, yet doing so can often be complex and difficult to maintain. This is where HITRUST comes in as a certifiable and recommended framework trusted...
Blog

Tainted Love, Ransomware, and More: This Month in Cybersecurity

February, while a short month, was long on cybersecurity threats. Read on for a few of the high- (well, low-lights) as well as for some resources from GoAnywhere MFT on how you can help secure your sensitive data files while they are in motion and in transit. Love Hurts The search for love turned up more than potential partners over the last few months (o.k., years). In fact, according to research...
Blog

What is a PGP File?

What is PGP and What is It Used For? PGP is short for Pretty Good Privacy and it’s one of the most widely used technologies for encrypting and authenticating files. It can help encrypt, decrypt, authenticate, and verity various file types including emails, files, directories, disk partitions, and more. PGP, along with its offshoots Open PGP and GPG , are used so frequently because they’re flexible...
Blog

HTTPS vs. SFTP: The Key Differences

What Are the Key Differences Between HTTPS and SFTP? HTTPS and SFTP are both important protocols used for the act of sending data. However, there are innate differences between them. Read more for a look at the key differences between HTTPS and SFTP . What is HTTPS? HTTPS , or Hypertext Transfer Protocol Secure, is a secure way to send data between a web server and a web browser. HTTPS is the...
Blog

Cybersecurity Concerns in Healthcare in 2022

Every year the healthcare industry is greeted with headlines stating that ‘last year was the most-breached ever .’ And that trend is unlikely to stop in 2022. The healthcare industry has historically been one of the most-targeted by hackers, and one of the most breached by internal actors. Key reasons why include vast amounts of extra sensitive patient data, higher-than-average payouts, and a slow...
Blog

Fast File Transfer Terms You Should Know

When looking for an accelerated file transfer solution, you may run into an alphabet soup of acronyms and abbreviations. We’re here to help you on your quest to find the fastest file transfer solution for your business needs by clarifying what these many terms mean, and why you should care about them. First, what exactly is fast file transfer , and how much faster is it than standard file transfer...
Blog

How Businesses Can Collaborate Securely with GoDrive

Collaborating or sharing information lies at the very heart of business. Securing these information exchanges, however, requires more than a firm handshake. The information your organization owns is priceless, so it’s vital to ensure that it is accessed, manipulated, and shared only by authorized individuals and with security measures that do not slow down the wheels of commerce. How Can an EFSS...
Blog

How the Coronavirus Has Changed Data Security

COVID-19 Has Made a Lasting Impact on Data Security The Coronavirus pandemic has altered many things in this world and data security is no exception. Along with the solid impact COVID-19 has made on data security, let’s highlight some of the other key ways lasting change has been made within businesses. The Lasting Change: Working from Home As of 2022 , 16 percent of companies in the world are now...
Blog

13 Essential MFT Blog Posts You Might Have Missed

There’s a lot out there (and just on this website) about what MFT (managed file transfer) software is , why it’s a good FTP alternative, and how to choose the best file transfer software for your business. That’s why we’ve selected 13 of our top blogs that answer those exactly those questions – and more. And because questions about any software solution typically depend on how – or if – you’re...
Blog

How to Send Big Files Quickly

Big and fast. Speedy and large. It’s a combination that’s sometimes tricky to execute, especially when it comes to sending large data files rapidly. Do you sacrifice speed? Do you risk having files interrupted mid-stream? Or do you roll the dice and hope your file won’t be rejected from the starting gate? You don’t have to make these kinds of choices when you use a file transfer solution that can...
Blog

The Role Between Shadow IT and Content Collaboration

Shadow IT is Problematic for Collaboration Content collaboration platforms are more popular than ever as organizations produce and share a plethora of content every day. A centralized platform can simplify collaboration and promote productivity, but Shadow IT can put a hindrance on progress and optimal file sharing practices. What is Shadow IT? Shadow IT is the use of information technology...
Blog

This Month in Cybersecurity: A Bit of Deja Vu

When it comes to the new year, 2022 has a familiar ring to it in more ways than one. Just like the year before, cybersecurity risks continue, with ongoing threats to sensitive data, major logging frameworks vulnerable, and payouts to some impacted customers again being made. While you might have recommitted to your personal exercise or diet plan on Jan. 1, consider also recommitting to your...
Blog

What is the Best MFT Software?

And the Award Goes To... Over the years, GoAnywhere Managed File Transfer (MFT) has been recognized time and time again by users, industry peers, and more as one of the best robust secure file transfer solutions on the market . Why GoAnywhere is the Best MFT Software First and foremost, aside from being both flexible and scalable, GoAnywhere helps organizations to transfer files in a seamless and...
Blog

Still WFH? Time to Revisit BYOD, Security, and More

Work from home, which was once an early-pandemic precaution, is becoming a norm across industries. It is likely that the pandemic has shifted how people work forever, with half of employees expecting to work predominantly from home or in a hybrid home-and-office system going forward. However, just as in the early days of the pandemic, cybersecurity while working from home is still a concern for IT...
Blog

AS2 Drummond Certified: GoAnywhere MFT Delivers Security and Interoperability

If you’re looking for a secure managed file transfer solution, why not check one out that has been recognized by the Drummond Group as AS2-certified? The AS2 features in Fortra' GoAnywhere Managed File Transfer (MFT) solution, were reviewed and tested against the world's highest standards, as set by the Drummond Group . Drummond AS2 Certification Highlights Full interoperability, Security This...
Blog

What is Shadow IT and Why is it a Problem?

Shadow IT Doesn’t Lurk in the Shadows – it's Prevalent Although it may seem foreign now, there was once a time when an organization’s IT department had complete and total control over the technology being used by the organization. Before software could be purchased, or before anyone clicked download, the IT Director’s blessing was needed. In current times, no matter how hard your IT department may...
Blog

Thinking about Managed File Transfer? MFT Trials are Invaluable.

Test-driving MFT Technology is Invaluable Taking a car out for a test drive provides a ton of insight. That sleek magazine ad or dazzling showroom floor may tempt you, but sometimes flashy looks and skilled salespeople can deliver a ride that doesn’t quite live up to your expectations. Getting behind the wheel to put that sleek ride through its paces, however, can confirm if a particular make and...