Blog

Blog

How to Help Ensure Compliance with Data Privacy Laws

  Image How to Help Ensure Compliance with Data Privacy Laws If complying with data privacy laws like the GDPR, PDPA, CPA, HIPAA, PCI DSS, PIPEDA, and more sometimes feels like swimming in alphabet soup, there is a life preserver that can simplify, secure, and automate the processes involved. Managed file transfer can proactively...
Blog

How Do I Securely Share and Send Large Files?

  Image The biggest danger of passing notes in grade school was interception by your teacher (or a box checked “no”) but sending large files these days carries a lot more risk. Messages that you’re sending in a work capacity likely contain information that’s more sensitive than schoolyard gossip or a question for your crush – and the...
Blog

Use Caution When Transferring Large Files – Mom Says So!

  Image Use Caution When Transferring Large Files – Mom Says So! “Drive carefully,” Eat your vegetables,” “Share those toys with your brother,” “Think again about how you’re transferring all those large files!” You know, your mom’s right. She usually is. And, when it comes to transferring big files, it IS smart to adopt a best...
Blog

What's the Difference Between AS2, AS3, and AS4?

  Image If you think these three protocols are simply sequential updates from the 1990s’ AS1 protocol you’d be mistaken. Each protocol brings its own distinct features to the data transmission table. Here’s a few key differences between them. What is AS2? AS2 (Applicability Statement 2) is a protocol specification used to transmit...
Blog

Best Practices to Share Large Files

  Image Sharing large files is critical for most businesses, but how do you ensure files make it to the right people — and not everyone else? When considerations like security, bulk transfers, and tracking come into play, businesses need more than a one-off solution to share files with employees, customers, and trading partners. ...
Blog

7 Essential Resources on PCI DSS Security

  Image Note from the Editor: This article was originally published in February 2017. It has been updated with resources current to PCI DSS version 3.2.1. Did you know that 80% of organizations are not compliant with PCI DSS requirements? That means, if you’re reading this, there’s a pretty good chance your company needs to...
Blog

Transferring Big Files: Everything You Need to Know

  Image We’ve all done it. Held our breath, crossed our fingers, or simply hoped for the best when hitting “send” to electronically share a large file. With a solid managed file transfer (MFT) in place, that critical keystroke doesn’t have to be so tense. With MFT, users can confidently move previously unwieldly files, knowing that...
Blog

5 Tips for Large File Transfers

  Image   It doesn't matter if you’re a small organization, a small-to-medium-sized (SMB) business, or an enterprise: at some point, you’ll likely need to exchange a large file transfer with a trading partner, third-party vendor, or client. If you don’t know how to support a large file transfer or lack the tools to execute it...
Blog

Which is Better? - AS2 vs. AS4

  Image   AS2 vs. AS4   AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and which of the two is better? What is AS2? AS2 (Applicability Statement 2) is a protocol specification that’s used to transmit...
Blog

Which is Better: AS2 vs. SFTP?

Over the last several months, we’ve compared many different file transfer protocols, including SFTP vs. FTPS and SFTP vs. MFT, and MFT vs. Dropbox for secure file sharing. Today, we’re going to look at AS2 vs. SFTP. How do these popular file transfer protocols work? How do they differ? And most importantly, which one is better for your organization’s file exchange...
Blog

10 Shocking PCI DSS Compliance Statistics

If you work for any organization that processes credit or debit card information, you’ve heard of the Payment Card Industry Data Security Standard (PCI DSS), the regulatory standard aimed at preventing costly data breaches like the ones you may have heard about at Home Depot or TJX. But how much do you really know about PCI DSS compliance? Here are some interesting PCI DSS...
Blog

3 Data Breaches That May Have Been Avoided through PCI DSS Compliance

  Image "Dear Valued Customer, As you may have heard, on September 8, 2014, we confirmed that our payment data systems have been breached, which could potentially impact customers using payment cards at our U.S. and Canadian stores."   This is an excerpt from an actual email distributed by a large retailer, in the wake of a...
Blog

SHA-2 and TLS Security for AS2 Transfers

  Image   SHA-2 and TLS Security for AS2 Transfers   It’s crucial for organizations to take the time to upgrade the security used to protect their AS2 data transfers. In order to be compliant with the latest security standards, you need to be using a modern AS2 solution. Related Reading: AS2 Protocol Software for Client & Server...
Blog

What is AS2? Common Protocol Explained

  Image For those that ask "What is AS2?," AS2 is an abbreviation for Applicability Statement 2, which is a popular file transfer protocol that allows businesses to exchange data with their trading partners. AS2 protocol combines the use of several secure and widely used technologies including HTTPS, SSL Certificates, S/MIME, and...
Blog

Meeting Compliance Regulations and Privacy Laws for Sensitive Data Transfers

  Image Comply with Data Security Requirements Highly sensitive data is exchanged between organizations on a constant basis making data security compliance more vital than ever to keep communication flowing. For instance, if a business routinely transmits financial information to their bank including payroll direct deposits and...