Blog

Blog

PDPA in Singapore Helps Protect Personal Data

  What is the PDPA of 2012? The Personal Data Protection Act of 2012 (PDPA) is a law designed to regulate and enforce the proper collection, use, disclosure, and care of the personal data of citizens in the Republic of Singapore. The Personal Data Protection Commission (PDPC) is charged with establishing policies and for reviewing organizational...
Blog

Should You Use a File Sharing App?

  Should You Use a File Sharing App? File sharing apps like Dropbox and Google Drive certainly have their appeal. They are user-friendly, often free, and do the job of getting information from one user to another. Until they don’t. Or, until your files are hacked, get into the wrong hands, live in infamy, have unrestricted access, or are manipulated...
Blog

7 Essential Resources on PCI DSS Security

  Note from the Editor: This article was originally published in February 2017. It has been updated with resources current to PCI DSS version 3.2.1. Did you know that 80% of organizations are not compliant with PCI DSS requirements? That means, if you’re reading this, there’s a pretty good chance your company needs to make adjustments to...
Blog

What is Secure File Sharing?

  What is Secure File Sharing? Secure is the operative word here. Dozens of applications allow you to transfer files – small to large – between different users or organizations. A secure file transfer solution, at its most basic, secures the movement of files while at rest and in transit confidentially – all within a protected mode. Secure file...
Blog

What is Operation Yellowhammer and How Does it Affect Data Transfers?

    What is Operation Yellowhammer?   If you are located in the United Kingdom (UK), then you may already be familiar with Operation Yellowhammer and its relationship to Brexit and the European Union (EU). For those of you that haven’t been briefed on Operation Yellowhammer and how it relates to Brexit, now is the perfect time to learn how this...
Blog

Meeting IT Security and Compliance Requirements with GoAnywhere MFT

  Meet your IT and compliance requirements easily with GoAnywhere MFT. GoAnywhere helps organizations and IT professionals comply with an array of strict regulations, methods, and technologies. To open a larger, clickable image, choose the "Download" option below. DOWNLOAD   For more of an in-depth look...
Blog

GDPR: Understanding the 8 Rights of Data Subjects

Find out what these new rights mean for your organization and how you can prepare.   GDPR (General Data Protection Regulation) is the EU’s new legal framework that replaced the EU Data Protection Directive in May 2018. While the directive was merely a recommendation, GDPR carries the force of law. The purpose of GDPR is similar to...
Blog

Why Choose Managed File Transfer Over Free File Sharing Methods?

  Why Choose Managed File Transfer? It’s no secret that many organizations struggle to fully protect the sensitive data their employees, customers, trading partners, and third-party vendors share. Free file sharing software and scripts are both common ways of transferring files, even though they’re not necessarily the most secure, can be complex, and...
Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

    Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020 Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll want to pay close...
Blog

I’ve Just Been Breached, Now What?

  So, you think (or perhaps you know) you’ve been breached. It’s every organization’s nightmare, and you’re living it, facing local and federal fines, upset customers, public panic, and a loss of intellectual property. A breach can be a harrowing ordeal; if you’re not sure what to do immediately after discovering the breach, your situation can quickly...
Blog

What is a DMZ and Why Do You Need a DMZ Secure Gateway?

  If you’ve watched a science-fiction movie about space travel, then you’ve likely seen some version of a scene in which an astronaut reenters their ship from the outside abyss. Because the ship exists as a haven from the dangerous environment of empty space, the astronaut cannot simply open the door and stroll directly into the cockpit. To do so would...
Blog

How 3 Financial Institutions Solve File Transfer Needs with MFT Software

  On a scale of 1-10, how would you rate the efficiency of your file transfers right now? If you use manual scripts, legacy software, or a myriad of free tools to balance your encryption, automation, cybersecurity, reporting, and collaboration needs, it’s possible you’ll rate your efficiency low on the scale. After all, professionals in banking and...
Blog

IT Pros in Healthcare: How to Choose a Secure File Transfer Solution

  Every healthcare provider wants to avoid being the next data breach headline—and unfortunately, we have seen many incidents and their consequences in 2018 so far. The causes of these data breaches range from wrongly configured databases to successful malware attacks and unauthorized user access. For those looking to avoid the pain, embarrassment,...
Blog

3 Ways Your Peers are Using Secure Forms

  If you exchange any amount of sensitive information as paper documents, electronic PDFs, images, or spreadsheets, you know keeping track of data and ensuring it gets where it needs to go can be a challenge. And if you work with multiple parties to receive this information, like employees, vendors, clients, stakeholders, and trading partners, you also...
Blog

15 Ways to Avoid Document Chaos with Secure Forms

  Vendors, employees, customers, and trading partners exchange an abundance of files every day, often by a variety of means including mail, email, telecomm apps like Skype, shared file storage like Dropbox or Google Drive, and sometimes even SMS. While documents are an inescapable reality for busy organizations, keeping track of this data can be...
Blog

5 Best Practices for IBM i File Transfers

  Using IBM’s built-in FTP and Open SSH servers to transfer files to and from your IBM i systems can be time-consuming, if not simply riddled with fine details. From scripting knowledge to running specific (and sometimes obscure) commands, there’s a lot to consider—and the safety and integrity of your files is probably at the top of the list. While...
Blog

30 Ways to Simplify Life with Advanced Workflows

  Are you using GoAnywhere’s Advanced Workflows yet? If not, you’re missing out. What are Workflows? Workflows are projects you can create in GoAnywhere MFT to define your file transfers and improve your business processes. Each project is able to contain multiple tasks that execute in a seamless end-to-end workflow. Pretty neat, right? Why Use...
Blog

Understanding the GDPR (General Data Protection Regulation)

Note from the Editor: This is an older resource on GDPR. For more on the latest GDPR resources, check out our GDPR resource page. Table of Contents Introduction What is the GDPR? GDPR and the Data Protection Directive 2018: The Year of GDPR GDPR and Brexit GDPR Fines and Penalties How to Prepare for the GDPR GDPR...
Blog

USPS Eliminates FTP, Requires Secure File Transfers

Early this year, the United States Postal Service (USPS) announced the elimination of FTP (File Transfer Protocol) from their business practices and policies—a change that strengthens the security of their data transmissions and addresses recent audit findings. What does this mean for you? The change is still in transition for now, but after August 31, 2017, mailers and shippers will need to...
Blog

How to Create a Cybersecurity Policy for Your Organization

  The cyberattacks and data breaches that make the news are usually the ones that happen at big corporations like TJX or Home Depot. But every organization, large or small, needs to be concerned about cybersecurity. According to Security Magazine, the average cost of a data breach for a small business is between $36,000 and $50,000. And while the...