Blog

Blog

9 Ways to Use GoAnywhere’s Cloud Connector Integrations

  Image There are many benefits to having a managed file transfer solution that supports built-in cloud integrations. From trading important files with business partners in Dropbox to automatically updating billing information in Salesforce from a central location, web app integrations in an MFT solution can simplify your critical...
Blog

How 3 Financial Institutions Solve File Transfer Needs with MFT Software

  Image On a scale of 1-10, how would you rate the efficiency of your file transfers right now? If you use manual scripts, legacy software, or a myriad of free tools to balance your encryption, automation, cybersecurity, reporting, and collaboration needs, it’s possible you’ll rate your efficiency low on the scale. After all,...
Blog

SFTP: The Smart Way to Transfer Your Cloud Data

  Image With the growing buzz about everything "cloud computing," most organizations are either starting to consider the cloud or have already moved some of their business processes to a cloud platform. No matter where you stand, technology is no stranger to the cloud. Consumers use cloud applications, services, and storage daily,...
Blog

IT Pros in Healthcare: How to Choose a Secure File Transfer Solution

  Image Every healthcare provider wants to avoid being the next data breach headline—and unfortunately, we have seen many incidents and their consequences in 2018 so far. The causes of these data breaches range from wrongly configured databases to successful malware attacks and unauthorized user access. For those looking to avoid...
Blog

On-Premises and the Cloud: A Comparison of Two Unique Environments

On-premises. The cloud. Hybrid environments. As technology evolves and business needs grow, organizations are rapidly trying to make sense of their options. What are the benefits of running their software and data on-premises? What concerns should IT and security teams be aware of when implementing their processes in the cloud? Can they do a bit of both and go hybrid? There...
Blog

5 Cloud Security Best Practices for Microsoft Azure

  Image Migrating company data to the cloud is often a primary goal for modern organizations. In fact, by 2018, 60% of organizations’ IT infrastructure will be cloud-based, according to IDG’s Enterprise Cloud Computing Survey. Cloud infrastructure comes with many benefits, including—but not limited to—reducing IT budgets, improved...
Blog

7 Cloud Security Best Practices for Amazon Web Services

  Image Temporary and permanent storage of data in the cloud has grown in popularity over the years. Companies like Land O’Lakes and Boeing moved their information to the cloud last year to simplify the technology they used. Video-streaming behemoth Netflix finished their journey to the cloud in early 2016 after seven years of moving...
Blog

USPS Eliminates FTP, Requires Secure File Transfers

Early this year, the United States Postal Service (USPS) announced the elimination of FTP (File Transfer Protocol) from their business practices and policies—a change that strengthens the security of their data transmissions and addresses recent audit findings. What does this mean for you? The change is still in transition for now, but after August 31, 2017, mailers and...
Blog

10 Shocking PCI DSS Compliance Statistics

If you work for any organization that processes credit or debit card information, you’ve heard of the Payment Card Industry Data Security Standard (PCI DSS), the regulatory standard aimed at preventing costly data breaches like the ones you may have heard about at Home Depot or TJX. But how much do you really know about PCI DSS compliance? Here are some interesting PCI DSS...
Blog

Truly Secure On-Premises Document Management for HR

  Image   HR departments receive, generate, and accumulate substantial volumes of documents such as job postings, employment applications, resumes, reference checks, testing data, personnel files, wage and hour records, payroll records, and disciplinary files.   GoDrive by GoAnywhere is a secure file storage and collaboration...
Blog

Could Your FTP Server Pass a Compliance Audit?

  Image If an auditor showed up to your office tomorrow and wanted to examine your file transfer security policies and procedures for compliance, how confident are you that your organization would pass with flying colors? If there’s any doubt that your file exchange process can meet stringent compliance requirements, a secure...
Blog

FIPS 140-2 Plays Vital Government Business Role

  Image   What is FIPS 140-2? FIPS 140-2 is a standard with which cryptographic-based (encryption) security systems must comply when protecting sensitive data in U.S. government agencies and departments. This FIPS 140-2 standard also extends to other entities that may exchange sensitive data with the federal government, including...
Blog

How to Build a Framework for HIPAA and HITECH Compliance

  Image HIPAA, established in 1996, was signed into law to outline the appropriate ways to use and disclose patient health information. Read on to learn how to develop a HIPAA- and HITECH-compliant IT framework for your organization.   Why Does HITECH Exist? HITECH laws were enacted to up the ante on healthcare organizations to...
Blog

Addressing HIPAA and HITECH Compliance Challenges

  Image HIPAA and HITECH regulations were designed and enacted to increase the security surrounding personal health information from those who should not have access to it. Next to finance, the healthcare industry is one of the most regulated industries around. While debates on the cost, structure, and delivery of healthcare...
Blog

Driving Securely Through the Cloud

  Image Cloud computing is not for everything and not for everyone, but it has made a permanent mark in the lexicon of technology services. And there is a lot of hype around cloud computing and what it can do for organizations. To be fair, it is a very powerful tool. But it’s important to work out how you can use it most effectively...