Blog

Blog

What is Wrong With Free File Transfer?

Free time! Free food! Free kittens! All great concepts, right? Free file transfers! Ummmm, not so much. The old adage, “If it sounds too good to be true, it probably is…” definitely holds when it comes to file transfers. After all, the data you send to third-parties, vendors, customers and even internal staff is priceless and, in the wrong hands...
Blog

Going Beyond File Transfer

Intergalactic – or at least global – organizations of all sizes use GoAnywhere MFT to securely transfer data while saving time, money, and valuable resources. But moving files from one place to another is just the start of the GoAnywhere adventure.GoAnywhere MFT has built-in elements that anyone can access from their first login alongside pick-and...
Blog

Top Data Breaches of 2019: How You Can Minimize Your Risks

Top Data Breaches of 2019: How You Can Minimize Your RiskYour organization made the headlines! That’s great, right? Not if it’s because you had sensitive data breached. A data breach can wreak financial and logistical havoc for you, your customers, patients, employees, and others. More importantly, it can severely impact the reputation you’ve so...
Blog

Resolve to Make Files More Secure in the New Year

Make Resolutions - AND Keep ThemResolutions. Every year you make them. Every year you break them. Make 2020 the year you finally resolve to make your file transfers more secure. Do it — even if you’re a stranger to the gym, you still sport those extra 10 pounds and haven’t called your mom in a week.Don’t wait until mid-January to feel guilty about...
Blog

SCP vs. SFTP: Which is Better?

The Secure File Sharing Matchup: Differences Between SFTP and SCPWhen sizing up SFTP vs. SCP you’ll find that the two file sharing protocols are quite similar. And, for some file transfer situations, they could be nearly interchangeable. Your need for speed, functionality and security will determine which protocol is best for you.SFTP vs. SCP: the...
Blog

10 Cybersecurity Tips and Best Practices

The 10 Best Cybersecurity Tips and Practices – as Told by IT Professionals Although there’s a lot of tips and best practices out there when it comes to cybersecurity, it’s important to make sure they’re coming from the right source. With October being National Cybersecurity Awareness Month, now is the perfect time to brush up on some of...
Blog

What are SFTP Servers?

What are SFTP Servers?A typical file transfer server helps transfer files server-to-server or client-to-server, and SFTP servers are a more protected version: they encrypt data to keep sensitive information secure while moving files, and some have the added bonus of encrypting files at rest. SFTP servers use a single data channel in which login...
Blog

Which is Faster: FTPS or SFTP?

FTPS vs. SFTPYou may have heard of FTPS and SFTP, but chances are that you may not be super familiar with them. If you haven’t had a chance to dive in deep, read on for a more in-depth look into FTPS, SFTP, and which of the two is faster.What is FTPS?FTPS (FTP over SSL/TLS), or File Transfer Protocol over Secure Sockets Layer/Transport Layer Security,...
Blog

Think Your Customer Data was Exposed? Follow These Steps

When a prospect or customer shares personal data with a business, they expect their information will be stored securely, kept safe from vulnerabilities, and used only for the purposes with which it was collected. Whether this data is an email address, a birthday, a personal identifier, or credit card numbers, the weight of trust placed on this...
Blog

Is FTP Dead?

Is FTP still a viable option for sending file transfers? While organizations across all industries have started shifting to secure FTP protocols like SFTP and FTPS, a surprising number of businesses still use FTP to transfer sensitive documents across internal and external networks. The search "how to use FTP" comes up with over 163 million...
Blog

I’ve Just Been Breached, Now What?

So, you think (or perhaps you know) you’ve been breached. It’s every organization’s nightmare, and you’re living it, facing local and federal fines, upset customers, public panic, and a loss of intellectual property. A breach can be a harrowing ordeal; if you’re not sure what to do immediately after discovering the breach, your situation can...
Blog

40 Cybersecurity User Groups, Forums & Communities to Join

What is the best cybersecurity resource? Answer: other people! Today more than ever, people are connecting with each other over shared problems and interests. Maybe there’s a particularly tricky problem that’s taunting you. Maybe you have exciting best practices to share with other professionals. Whether you’re a cybersecurity industry veteran,...
Blog

Everything You Need to Know about FTP Automation Software

So, you want to automate your FTP file transfers. Whether you send a dozen file transfers a week, hundreds a day, or even more, automation is a smart step for most businesses. The benefits are simple: automatic file transfers cut down on user errors, reduce or eliminate the need for scripts, free up manual time spent on creating and maintaining jobs,...
Blog

Which is Better: AS2 vs. SFTP?

Over the last several months, we’ve compared many different file transfer protocols, including SFTP vs. FTPS and SFTP vs. MFT, and MFT vs. Dropbox for secure file sharing.Today, we’re going to look at AS2 vs. SFTP. How do these popular file transfer protocols work? How do they differ? And most importantly, which one is better for your organization’s file exchange requirements?Let’s dive in.What is...
Blog

FTP vs Cloud | Why You Should Never Use FTP to Transfer Cloud Files

What is FTP?File Transfer Protocol, or FTP, is a basic protocol used to transfer files between a client, (which initiates the connection), and a server on a network. FTP operates as a client-server model protocol and is considered an application layer protocol.With FTP, the end user’s computer is the local host; the second computer is called the...
Blog

Which is Better: Free SFTP Software vs. Enterprise-Level SFTP Software?

Free SFTP Software vs. Enterprise-Level SFTP Solutions In general, people like free things. Beverages, company lunches, swag at tradeshows and conferences, t-shirts and socks, those intriguing items in the “For Free” box at your local yard sale… You can’t go wrong with free, right? Well, coffee you don’t have to pay for is great, but the adage “There’s no such thing as a free lunch” exists for a...
Blog

What is Secure File Transfer?

Moving sensitive, often-proprietary files from one person—or organization—to another has become a complex aspect of the business world today. This complexity comes not only from the size and number of files that need to be shared, but also from the need to protect them at all points during their journey from sender to receiver.Even though there are...
Blog

Data Breach and Incident Response Plans | 2019 Templates & Best Practices

Every year, organizations hope that statistics for data breaches will improve, that things will be better than the year before. And every year, they are dismayed to discover that even though they’re pulling in new cybersecurity tactics to thwart cyber attacks, so are hackers pulling in new methods to discover their organizations’ weakest...
Blog

What is FTPS?

Whether you’re looking to upgrade from your current FTP file transfers or have new requirements from a trading partner or customer, you might be wondering what FTPS is. You may ask: how does FTPS work, and does it differ from secure file transfer protocols like SFTP and AS2?Good questions. Let’s start by defining what FTPS is. ...
Blog

Which is Better: SFTP vs. MFT?

SFTP, or MFT: that is the question.Even though we’re not all famous poets like William Shakespeare, many IT professionals will ask this question at some point or another. Should they use an SFTP or managed file transfer (MFT) solution to transfer sensitive files securely—and why?It brings up an interesting choice. By nature, SFTP and MFT solutions...