Blog

Blog

Why Choose AS2 for Secure File Transfers?

Image Securing all the data your organization exchanges is a need, not a want in today’s cybersecurity environment. To minimize the risk of a security breach – whether intentionally malicious, or accidental through user error – takes the proverbial village of proactive measures. One of these is employing strong protocols such as AS2 ...
Blog

A Perfect Match: GoAnywhere MFT and Open PGP

Image As companies face increasing pressure to keep data safe, encryption protocols like Open PGP provide an increased level of security to do so. An open-source version of PGP (Pretty Good Protection), Open PGP delivers the same level of protection in a publicly available format. Because of its high availability, it enjoys widespread...
Blog

FTP 101: What are the Basics?

There's no shortage of shortage when choosing just the right FTP for your organization. Learn the differences and which FTP may be right for you.
Blog

Education Industry: How MFT Can Help Stretch Resources

Image Educational institutions, from preschools to university systems, face increasing pressure on budgets as well as personnel lately. When every minute and every dollar counts, bolstering existing resources where possible can offer a bit of relief. One way to stretch those human resources is by automating some of the tasks that are...
Blog

PCI DSS 4.0 - What to Expect, What's Coming, How to Comply

  Image Get ready for more stringent PCI DSS compliance requirements. The PCI Security Standards Council (PCI SSC) updated its version 4.0 requirements in March 2022, in large part to address increasingly sophisticated cybercriminal threats. Rapidly growing contactless and cloud-based card usage also helped nudge an update to PCI DSS...
Blog

What Do Emerging Data Privacy Laws in the U.S. Mean for You?

  Image What is Data Privacy? One can think of data privacy as all the processes involved in how confidential or personal information or data is collected, used, and shared or governed. No singular policy governs data privacy, with requirements and penalties varying across states and countries. Data privacy laws are legal constructs...
Blog

Secure File Transfer Drives Compliance and Efficiency for Credit Unions

  Image The unwavering protection of personally identifiable information (PII) is the foundation upon which financial and banking organizations build their services and instill trust in customers. Achieving this requires credit unions and related companies to navigate a fine balance between stringent data security and business...
Blog

AS2 Drummond Certified: GoAnywhere MFT Delivers Security and Interoperability

  Image If you’re looking for a secure managed file transfer solution, why not check one out that has been recognized by the Drummond Group as AS2-certified? The AS2 features in Fortra' GoAnywhere Managed File Transfer (MFT) solution, were reviewed and tested against the world's highest standards, as set by the Drummond Group. ...
Blog

What is PGP Encryption and How to Use It

  Image Encryption is key to securing organizational data in the short term and long. However, there are a few different types of encryption that organizations can use to achieve the optimal level of security. GnuPG is one of the most notable. However, today we’ll break down how PGP encryption works and how to use it to maintain the...
Blog

What is PGP and How Does It Work?

  Image When someone in your organization wants to transfer a file – internally or outside of the organization – a few concerns may come up: Is the file complete? Is it being sent to the right place? Will it arrive intact? Is sensitive data protected and encrypted from unauthorized recipients? All are valid concerns, and each can...
Blog

What is Drummond Certification?

  Image Drummond Certification: What is it? The Drummond Group is a third-party certification body that certifies software products and solutions to ensure a given solution does what it says it will. A security solution that goes through their extensive certification process earns the right to add the Drummond-certified distinction...
Blog

PGP vs. Open PGP: What’s the Difference?

  Image   Encryption standards become more and more important every day. With the rise of data breaches, it’s critical now more than ever for organizations to raise the level at which they protect their information. Partly, educating employees has presented itself as an easy way to make data safer. However, taking the time to choose...
Blog

Should You Use PGP or GPG Encryption?

  Image Not every piece of information is meant for every pair of eyes. That’s why organizations count on encryption technology – to lock down their sensitive data from malicious acquisition or even human error. And, when it comes to those encryption protocols, you’ve got options. One choice you or your IT team might need to make is...
Blog

Avoid a PCI Breach; Avoid Costly Consequences

  Image Trending and making news headlines can be great for business, but not if the reason you’re making news is because of a PCI breach. Any organization that processes credit or debit card information is vulnerable, but any organization can also take steps to minimize their risks and the costly mitigation efforts that follow a...
Blog

AS2 vs. FTP

  Image When it comes to B2B communications, AS2 and FTP rank among the most popular file transfer protocols. Each protocol can serve your business in a different way, which makes it important to examine your needs along the research journey. Today we’re going to examine AS2 vs. FTP by their key components to help you decide which...
Blog

What is GPG?

  Image What is GPG? GPG, also known as GNU Privacy Guard (GnuPG), is a different adaption, but popular implementation of the Open PGP standard as defined by RFC 4880. GPG in Depth GPG is an open-source standard and strong alternative to the official PGP software owned by Symantec. It was developed by Werner Koch and released in...
Blog

The 5 Biggest PCI Compliance Breaches

  Image The Payment Card Industry Data Security Standard (PCI DSS) is the main information security standard for organizations that process credit or debit card information must abide by. The guidelines established in PCI DSS cover how to secure data handling processes. While most organizations work to avoid PCI compliance breaches...
Blog

PCI Statistics That May Shock You

  Image   If your organization processes credit or debit card information, you’re probably already familiar with the Payment Card Industry Data Security Standard (PCI DSS), the regulatory standard enacted to prevent large data breaches like the ones you hear about frequently – the ones that make headlines for all the wrong reasons. ...
Blog

8 Real Ways Financial Organizations Use GoAnywhere MFT

  Image GoAnywhere MFT is the Ultimate Asset for Banking and Finance For banking and financial organizations, protecting sensitive customer data and meeting compliance requirements for regulations is critical. From controlling the exchange of sensitive cardholder data, to tracking file movements for easy auditing, GoAnywhere...
Blog

How to Help Ensure Compliance with Data Privacy Laws

  Image How to Help Ensure Compliance with Data Privacy Laws If complying with data privacy laws like the GDPR, PDPA, CPA, HIPAA, PCI DSS, PIPEDA, and more sometimes feels like swimming in alphabet soup, there is a life preserver that can simplify, secure, and automate the processes involved. Managed file transfer can proactively...