Blog

Blog

Why Choose AS2 for Secure File Transfers?

Image Securing all the data your organization exchanges is a need, not a want in today’s cybersecurity environment. To minimize the risk of a security breach – whether intentionally malicious, or accidental through user error – takes the proverbial village of proactive measures. One of these is employing strong protocols such as AS2 ...
Blog

A Perfect Match: GoAnywhere MFT and Open PGP

Image As companies face increasing pressure to keep data safe, encryption protocols like Open PGP provide an increased level of security to do so. An open-source version of PGP (Pretty Good Protection), Open PGP delivers the same level of protection in a publicly available format. Because of its high availability, it enjoys widespread...
Blog

FTP 101: What are the Basics?

There's no shortage of shortage when choosing just the right FTP for your organization. Learn the differences and which FTP may be right for you.
Blog

Secure File Sharing for Banks Gets a Boost from GoAnywhere MFT

Image Secure file sharing for banks has always been of utmost importance and is only gaining traction in the face of common cybersecurity threats and compliance requirements alike. Requirements like PCI DSS, GDPR, GLBA, and more can make processes more complicated, even as the safeguards outlined within them promote data security to...
Blog

AS2 Drummond Certified: GoAnywhere MFT Delivers Security and Interoperability

  Image If you’re looking for a secure managed file transfer solution, why not check one out that has been recognized by the Drummond Group as AS2-certified? The AS2 features in Fortra' GoAnywhere Managed File Transfer (MFT) solution, were reviewed and tested against the world's highest standards, as set by the Drummond Group. ...
Blog

The Surprising Relationship Between Data Privacy Laws and File Sharing

  Image Location, location, location. Not just the mantra of realtors and would-be buyers – it’s also a concern for data security professionals world-wide. As cloud computing has ramped up across industries, the physical location of stored data has been called into question, alongside concerns stemming from data privacy laws. Read...
Blog

The Ultimate Guide to GDPR

  Image   The Guide to GDPR   The General Data Protection Regulation (GDPR) is a regulation that establishes protections for the privacy and security of sensitive data for individuals in the European Union (EU). The data protection regulation was designed to harmonize data privacy laws throughout the EU and replaced the long...
Blog

What is PGP Encryption and How to Use It

  Image Encryption is key to securing organizational data in the short term and long. However, there are a few different types of encryption that organizations can use to achieve the optimal level of security. GnuPG is one of the most notable. However, today we’ll break down how PGP encryption works and how to use it to maintain the...
Blog

GDPR and its Relationship with Healthcare

  Image   What is GDPR?   The General Data Protection Regulation (GDPR) establishes protections for the privacy and security of sensitive data for individuals in the European Union (EU). The data protection regulation was designed to harmonize data privacy laws throughout the EU and replaced the long-standing Data Protection...
Blog

What is PGP and How Does It Work?

  Image When someone in your organization wants to transfer a file – internally or outside of the organization – a few concerns may come up: Is the file complete? Is it being sent to the right place? Will it arrive intact? Is sensitive data protected and encrypted from unauthorized recipients? All are valid concerns, and each can...
Blog

What is Drummond Certification?

  Image Drummond Certification: What is it? The Drummond Group is a third-party certification body that certifies software products and solutions to ensure a given solution does what it says it will. A security solution that goes through their extensive certification process earns the right to add the Drummond-certified distinction...
Blog

PGP vs. Open PGP: What’s the Difference?

  Image   Encryption standards become more and more important every day. With the rise of data breaches, it’s critical now more than ever for organizations to raise the level at which they protect their information. Partly, educating employees has presented itself as an easy way to make data safer. However, taking the time to choose...
Blog

How Cloud Technology is Transforming the Healthcare Industry

  Image When you think of files in healthcare, you may think of illegible doctor notes, clipboards with unpronounceable drugs, or a hastily printed summary of your visit. The healthcare industry generates a lot of paperwork that makes its way into many hands, so how can healthcare organizations keep it flowing to the right places –...
Blog

Should You Use PGP or GPG Encryption?

  Image Not every piece of information is meant for every pair of eyes. That’s why organizations count on encryption technology – to lock down their sensitive data from malicious acquisition or even human error. And, when it comes to those encryption protocols, you’ve got options. One choice you or your IT team might need to make is...
Blog

AS2 vs. FTP

  Image When it comes to B2B communications, AS2 and FTP rank among the most popular file transfer protocols. Each protocol can serve your business in a different way, which makes it important to examine your needs along the research journey. Today we’re going to examine AS2 vs. FTP by their key components to help you decide which...
Blog

What is GPG?

  Image What is GPG? GPG, also known as GNU Privacy Guard (GnuPG), is a different adaption, but popular implementation of the Open PGP standard as defined by RFC 4880. GPG in Depth GPG is an open-source standard and strong alternative to the official PGP software owned by Symantec. It was developed by Werner Koch and released in...
Blog

How to Comply with Brazil's Lei Geral de Proteção de Dados (LGPD)

  Image What is Brazil’s LGPD? LGPD stands for Lei Geral de Proteção de Dados (General Data Protection Law), which is a law streamlining what was previously 40 separate statutes protecting personal data in Brazil. Academic research and legislation around personal data and privacy has been an active priority in Brazil, culminating in...
Blog

German DPAs Announce New Email Encryption Guidance

Image In May of 2020, substantial guidance on email encryption was issued by the German Data Protection Authorities (German DPAs) specific to personal data transferred via email. These guidelines recommend reducing the risks of a personal data breach with both end-to-end encryption and transport encryption. The new guidelines build...
Blog

How to Help Ensure Compliance with Data Privacy Laws

  Image How to Help Ensure Compliance with Data Privacy Laws If complying with data privacy laws like the GDPR, PDPA, CPA, HIPAA, PCI DSS, PIPEDA, and more sometimes feels like swimming in alphabet soup, there is a life preserver that can simplify, secure, and automate the processes involved. Managed file transfer can proactively...
Blog

GDPR and Data Privacy after Brexit: What’s Next?

  Image So, the GDPR (General Data Protection Regulation) hit us with a bang in May 2018 and aside from a few high-profile fines, companies seem to be coping well on the whole. But is that really what’s happening or is it like an elegant swan, calm above water but flapping around underneath? It is safe to say that by now companies...