Blog

Blog

What is FISMA?

  What is FISMA and How Does it Work? The Federal Information Security Management Act (FISMA) is a 2002 United States law that outlines steps and guidelines to follow to reduce security risks to federal data. FISMA applies to all U.S. federal agencies, some state agencies, and any private sector organizations that have a contract with the U.S. government. Additionally, both...
Blog

The 5 Biggest PCI Compliance Breaches

  Image The Payment Card Industry Data Security Standard (PCI DSS) is the main information security standard for organizations that process credit or debit card information must abide by. The guidelines established in PCI DSS cover how to secure data handling processes. While most organizations work to avoid PCI compliance breaches...
Blog

PCI Statistics That May Shock You

  Image   If your organization processes credit or debit card information, you’re probably already familiar with the Payment Card Industry Data Security Standard (PCI DSS), the regulatory standard enacted to prevent large data breaches like the ones you hear about frequently – the ones that make headlines for all the wrong reasons. ...
Blog

How to Comply with Brazil's Lei Geral de Proteção de Dados (LGPD)

  Image What is Brazil’s LGPD? LGPD stands for Lei Geral de Proteção de Dados (General Data Protection Law), which is a law streamlining what was previously 40 separate statutes protecting personal data in Brazil. Academic research and legislation around personal data and privacy has been an active priority in Brazil, culminating in...
Blog

What is the Digital Charter Implementation Act?

  Image   Introducing the Digital Charter Implementation Act, 2020   In November 2020, one of the biggest shakeups in the history of Canada’s privacy law, the Digital Charter Implementation Act (DCIA), was proposed and is currently on the horizon. The DCIA is composed of two separate Acts: The Consumer Privacy Protection Act ...
Blog

Compliance for Healthcare: Secure File Transfer Holds the Key

  Image Complying with your doctor’s recommendations is the primary key to feeling good and staying healthy. Complying with the healthcare industry’s security standards and personal data protection requirements holds the key to avoiding an audit failure, paying steep fines, or trying to heal from the impact of a data breach. Sure,...
Blog

How to Implement the Right Enterprise File Sharing Solution

  Image Implementation 101 An enterprise file sharing solution is an important tool for organizations to have. The benefits are practically endless – from ensuring compliance with data regulations, to streamlining transfers with automation, to the auditing and reporting capabilities – implementing the right tool is key. However,...
Blog

19 Ways to Transfer Big Files

  Image You have choices when it comes to sending large files. You can choose to take your chances with free file transfer solutions, but they can be risky. Using a managed file transfer (MFT) solution is a reliable way to secure your data and ensure it gets where it needs to be. Here’s a few ways you can get peace-of-mind when...
Blog

What is File Encryption Software?

  Image File encryption software is a tool – either free or paid – that encodes your information so that it remains secure in motion, at rest, or both. Securing sensitive data is essential for any organization, and file encryption software does the heavy lifting. File encryption software uses one of several complex algorithms to...
Blog

Pair Your Enterprise File Sharing Solution with Data Loss Prevention

  Image Is Your Enterprise File Sharing Solution Enough? Enterprise file sharing solutions are already a great way to encrypt sensitive data in motion, but encryption alone is not enough. Can you ensure that sensitive information is not accidentally transmitted? Are you able to audit who is sending what? And last, but not least,...
Blog

How GoAnywhere MFT Helps the Healthcare Industry Thrive

  Image GoAnywhere MFT is Just What the Doctor Ordered The healthcare industry is a complex system full of regulations to comply with and highly sensitive data to move from one location to the next. From dramatic cost cutting, to eliminating manual processes, to strengthening data encryption and more, GoAnywhere Managed File...
Blog

Signs Your Business is Ready for an Enterprise File Transfer Solution

  Image Follow the Signs If you and your enterprise are needing to regularly transfer sensitive data between users, employees, and trading partners, it’s important to follow the signs. One wrong move, such as the lack of file encryption for transfers, can hit your organization with huge fines for non-compliance. It’s important to...
Blog

Key Cybersecurity Takeaways from the EasyJet Data Breach

  Image A data breach can wreak financial and logistical havoc for companies who experience them, not to mention customers, employees, and others who depend on or work with the breached organization. And even though it seems like data breaches are becoming more pervasive, they continue to severely impact organizations’ carefully...
Blog

What are Data Silos?

  Image   Standing alone can be an uncomfortable feeling at any gathering. You may only hear part of a conversation; you might not mesh well with the others in the room; you could face a number of awkward silences, and even be rejected completely.   Feeling like a lone wolf at a party is discomforting for sure. Having critical...
Blog

What is EFSS?

  Image If you’ve ever had to MacGyver a way to send out a too-large file or work with a group of people on a single document, EFSS is probably what you were looking for to make the process painless: it’s a solution that makes sharing files (of any size) and collaborating in one place easy – and secure. EFSS stands for Enterprise...
Blog

How Does the DMZ Impact Security?

  Image Your Secret Weapon for Data Security When weapons and military forces have been removed from active duty, this is referred to as “demilitarization.” On the internet, the demilitarized zone, or the DMZ, is a similar situation. What is the DMZ? The DMZ is the neutral network that resides between the Internet and your...
Blog

What is NIST?

  Image NIST, the National Institute of Standards and Technology, is a lab and non-regulatory federal agency of the U.S. Department of Commerce. Founded in 1901 as a tool to boost the U.S.'s global competitiveness, NIST fosters efforts to create standards across technology systems. Today, NIST continues to push for innovation in a...
Blog

4 Benefits of On-premises Enterprise File Sync and Sharing

  Image The value of mission-critical business documents can't be overstated — but lax or renegade employees or trading partners can put your sensitive data at risk with reckless storage or sharing practices. Luckily, knowing that your data hasn't been exposed is as easy as implementing a secure Enterprise File Sync and Share (EFSS)...
Blog

What are the Secure Messaging Standards in Australia?

  Image Secure Messaging in Healthcare Healthcare is essential to live a healthy life, but it shouldn’t come at the expense of your privacy. Healthcare is an industry that will always be growing, which means that if your situation transitions to a place where you need to see a new doctor or a specialist, your very private and...
Blog

What is the California Consumer Privacy Act?

  Image The California Consumer Privacy Act (CCPA), the latest data privacy law in the Golden State, went into effect on January 1st, 2020. Some have compared it to the UK’s GDPR (General Data Protection Regulation), and they’re not far off – like the GDPR, the CCPA is intended to protect individuals’ private data by making data...