Blog

Blog

What is Health Level Seven (HL7)?

    What is HL7?   HL7, short for Health Level Seven, is a set of international Electronic Data Interchange (EDI) standards used to provide guidance with the transfer and sharing of clinical and administrative data between software applications used by various healthcare providers. These standards focus on the Application Layer, or “layer 7” in the...
Blog

AS2 vs. FTP

  When it comes to B2B communications, AS2 and FTP rank among the most popular file transfer protocols. Each protocol can serve your business in a different way, which makes it important to examine your needs along the research journey. Today we’re going to examine AS2 vs. FTP by their key components to help you decide which file transfer protocol will...
Blog

Can HIPAA-Certified Solutions Really Guarantee Compliance?

  When searching for a new software solution to meet your organization’s needs, it’s easy to see the labels “HIPAA-Certified” or “HIPAA Compliant” and believe your bases are covered. After all, “HIPAA-Certified” means the product or application follows HIPAA’s privacy rules and has everything in place to protect your health and patient information,...
Blog

Compliance for Healthcare: Secure File Transfer Holds the Key

  Complying with your doctor’s recommendations is the primary key to feeling good and staying healthy. Complying with the healthcare industry’s security standards and personal data protection requirements holds the key to avoiding an audit failure, paying steep fines, or trying to heal from the impact of a data breach. Sure, you can meet stringent...
Blog

Pair Your Enterprise File Sharing Solution with Data Loss Prevention

  Is Your Enterprise File Sharing Solution Enough? Enterprise file sharing solutions are already a great way to encrypt sensitive data in motion, but encryption alone is not enough. Can you ensure that sensitive information is not accidentally transmitted? Are you able to audit who is sending what? And last, but not least, are you protecting your...
Blog

3 Powerful Examples of MFT and DLP Paired in Action

      On paper, combining two robust software products to form a more complete solution is a no-brainer. But how does it actually work in “real life?” First, let’s take a look at what the two solutions – adaptive data loss protection (A-DLP) and managed file transfer (MFT) – each offer to users. Then, we’ll highlight a few specific use cases where...
Blog

How to Help Ensure Compliance with Data Privacy Laws

  How to Help Ensure Compliance with Data Privacy Laws If complying with data privacy laws like the GDPR, PDPA, CPA, HIPAA, PCI DSS, PIPEDA, and more sometimes feels like swimming in alphabet soup, there is a life preserver that can simplify, secure, and automate the processes involved. Managed file transfer can proactively help organizations meet...
Blog

How GoAnywhere MFT Helps the Healthcare Industry Thrive

  GoAnywhere MFT is Just What the Doctor Ordered The healthcare industry is a complex system full of regulations to comply with and highly sensitive data to move from one location to the next. From dramatic cost cutting, to eliminating manual processes, to strengthening data encryption and more, GoAnywhere Managed File Transfer (MFT) is just what the...
Blog

What's the Difference Between AS2, AS3, and AS4?

  If you think these three protocols are simply sequential updates from the 1990s’ AS1 protocol you’d be mistaken. Each protocol brings its own distinct features to the data transmission table. Here’s a few key differences between them. What is AS2? AS2 (Applicability Statement 2) is a protocol specification used to transmit sensitive data securely...
Blog

Which is Better? - AS2 vs. AS4

    AS2 vs. AS4   AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and which of the two is better? What is AS2? AS2 (Applicability Statement 2) is a protocol specification that’s used to transmit sensitive data securely...
Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

    Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020 Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll want to pay close...
Blog

Which is Better: AS2 vs. SFTP?

Over the last several months, we’ve compared many different file transfer protocols, including SFTP vs. FTPS and SFTP vs. MFT, and MFT vs. Dropbox for secure file sharing. Today, we’re going to look at AS2 vs. SFTP. How do these popular file transfer protocols work? How do they differ? And most importantly, which one is better for your organization’s file exchange requirements? Let’s dive in. ...
Blog

IT Pros in Healthcare: How to Choose a Secure File Transfer Solution

  Every healthcare provider wants to avoid being the next data breach headline—and unfortunately, we have seen many incidents and their consequences in 2018 so far. The causes of these data breaches range from wrongly configured databases to successful malware attacks and unauthorized user access. For those looking to avoid the pain, embarrassment,...
Blog

2018 Cybersecurity Concerns in Healthcare and How to Address Them

The first few weeks of January always seem to be accompanied by an influx of new cybersecurity trends, forecasts, and concerns. As expected, 2018 has followed this pattern—and with the need for secure patient information growing ever more critical and the arrival of GDPR in May, it’s no surprise that healthcare experts are deep in conversation about...
Blog

Are Your Electronic Health Records (EHRs) Secure?

  Since moving to Electronic Health Records and modern EHR technology, the healthcare industry has taken great strides to enhance patient care, internal workflows, and business-to-business communication. These improvements bring organizations closer and closer to full integration with others in the industry; a goal that will, once fully achieved, help...
Blog

8 Ways to Protect Your Healthcare Organization from a Data Breach

In 2020, there were 642 data breaches of healthcare organizations. That’s a new record, up 25 percent from the previous year. In these breaches, the records of millions of Americans were exposed. These incidents occurred at all types of organizations in the industry, including clinics, insurance providers and their health system business associates.   If you’re in the healthcare industry...
Blog

HIPAA Compliance: Guide Details How MFT Helps

  Are your file transfers HIPAA compliant? Is your healthcare organization at risk for fines, or worse - a data breach of sensitive patient information? Many healthcare IT teams meet these broad questions with unease. After all, the ramifications of a healthcare data breach can impact organizations and individuals for years to come as well as have a...
Blog

Why Healthcare Organizations Need a Secure Data Transfer Solution

The last few years were scary in terms of healthcare cybersecurity. A hack of Banner Health breached up to 3.7 million records. Another data breach at 21st Century Oncology resulted in multiple lawsuits being filed against the organization. When a third party gained unauthorized access to computer systems at Valley Anesthesiology and Pain Consultants, almost 900 thousand patients, employees, and...
Blog

SHA-2 and TLS Security for AS2 Transfers

    SHA-2 and TLS Security for AS2 Transfers   It’s crucial for organizations to take the time to upgrade the security used to protect their AS2 data transfers. In order to be compliant with the latest security standards, you need to be using a modern AS2 solution. Related Reading: AS2 Protocol Software for Client & Server Transfers The Story of...
Blog

What is AS2? Common Protocol Explained

  For those that ask "What is AS2?," AS2 is an abbreviation for Applicability Statement 2, which is a popular file transfer protocol that allows businesses to exchange data with their trading partners. AS2 protocol combines the use of several secure and widely used technologies including HTTPS, SSL Certificates, S/MIME, and file hashing. By utilizing...