Blog

Blog

15 Ways to Avoid Document Chaos with Secure Forms

  Image Vendors, employees, customers, and trading partners exchange an abundance of files every day, often by a variety of means including mail, email, telecomm apps like Skype, shared file storage like Dropbox or Google Drive, and sometimes even SMS. While documents are an inescapable reality for busy organizations, keeping track...
Blog

5 Best Practices for IBM i File Transfers

  Image Using IBM’s built-in FTP and Open SSH servers to transfer files to and from your IBM i systems can be time-consuming, if not simply riddled with fine details. From scripting knowledge to running specific (and sometimes obscure) commands, there’s a lot to consider—and the safety and integrity of your files is probably at the...
Blog

30 Ways to Simplify Life with Advanced Workflows

  Image Are you using GoAnywhere’s Advanced Workflows yet? If not, you’re missing out. What are Workflows? Workflows are projects you can create in GoAnywhere MFT to define your file transfers and improve your business processes. Each project is able to contain multiple tasks that execute in a seamless end-to-end workflow. Pretty...
Blog

How to Create a Cybersecurity Policy for Your Organization

  Image The cyberattacks and data breaches that make the news are usually the ones that happen at big corporations like TJX or Home Depot. But every organization, large or small, needs to be concerned about cybersecurity. According to Security Magazine, the average cost of a data breach for a small business is between $36,000 and ...
Blog

10 Shocking PCI DSS Compliance Statistics

If you work for any organization that processes credit or debit card information, you’ve heard of the Payment Card Industry Data Security Standard (PCI DSS), the regulatory standard aimed at preventing costly data breaches like the ones you may have heard about at Home Depot or TJX. But how much do you really know about PCI DSS compliance? Here are some interesting PCI DSS...
Blog

3 Data Breaches That May Have Been Avoided through PCI DSS Compliance

  Image "Dear Valued Customer, As you may have heard, on September 8, 2014, we confirmed that our payment data systems have been breached, which could potentially impact customers using payment cards at our U.S. and Canadian stores."   This is an excerpt from an actual email distributed by a large retailer, in the wake of a...
Blog

Truly Secure On-Premises Document Management for HR

  Image   HR departments receive, generate, and accumulate substantial volumes of documents such as job postings, employment applications, resumes, reference checks, testing data, personnel files, wage and hour records, payroll records, and disciplinary files.   GoDrive by GoAnywhere is a secure file storage and collaboration...
Blog

Is Your Company Letting Data Slip Through the Cracks?

  Image Many Americans have spent the last few days frantically searching for receipts and other documentation to finish their taxes before April 15th — only to realize they get a one-month reprieve this year. Despite that sigh of relief, there's no doubt that some of those people thought they knew exactly where to find what they...
Blog

Meeting Compliance Regulations and Privacy Laws for Sensitive Data Transfers

  Image Comply with Data Security Requirements Highly sensitive data is exchanged between organizations on a constant basis making data security compliance more vital than ever to keep communication flowing. For instance, if a business routinely transmits financial information to their bank including payroll direct deposits and...