Blog

Blog

7 Essential Resources on PCI DSS Security

  Note from the Editor: This article was originally published in February 2017. It has been updated with resources current to PCI DSS version 3.2.1. Did you know that 80% of organizations are not compliant with PCI DSS requirements? That means, if you’re reading this, there’s a pretty good chance your company needs to make adjustments to...
Blog

SCP vs. SFTP: Which is Better?

  The Secure File Sharing Matchup: Differences Between SFTP and SCP When sizing up SFTP vs. SCP you’ll find that the two file sharing protocols are quite similar. And, for some file transfer situations, they could be nearly interchangeable. Your need for speed, functionality and security will determine which protocol is best for you. First, the...
Blog

10 Cybersecurity Tips and Best Practices

    The 10 Best Cybersecurity Tips and Practices – as Told by IT Professionals   Although there’s a lot of tips and best practices out there when it comes to cybersecurity, it’s important to make sure they’re coming from the right source. With October being National Cybersecurity Awareness Month, now is the perfect time to brush up on some of the...
Blog

What are SFTP Servers?

    What are SFTP Servers? A typical file transfer server helps transfer files server-to-server or client-to-server, and SFTP servers are a more protected version: they encrypt data to keep sensitive information secure while moving files, and some have the added bonus of encrypting files at rest. SFTP servers use a single data channel in which login...
Blog

Which is Faster: FTPS or SFTP?

  FTPS vs. SFTP You may have heard of FTPS and SFTP, but chances are that you may not be super familiar with them. If you haven’t had a chance to dive in deep, read on for a more in-depth look into FTPS, SFTP, and which of the two is faster. What is FTPS? FTPS (FTP over SSL/TLS), or File Transfer Protocol over Secure Sockets Layer/Transport Layer...
Blog

Meeting IT Security and Compliance Requirements with GoAnywhere MFT

  Meet your IT and compliance requirements easily with GoAnywhere MFT. GoAnywhere helps organizations and IT professionals comply with an array of strict regulations, methods, and technologies. To open a larger, clickable image, choose the "Download" option below. DOWNLOAD   For more of an in-depth look...
Blog

GDPR: Understanding the 8 Rights of Data Subjects

Find out what these new rights mean for your organization and how you can prepare.   GDPR (General Data Protection Regulation) is the EU’s new legal framework that replaced the EU Data Protection Directive in May 2018. While the directive was merely a recommendation, GDPR carries the force of law. The purpose of GDPR is similar to...
Blog

Think Your Customer Data was Exposed? Follow These Steps

  When a prospect or customer shares personal data with a business, they expect their information will be stored securely, kept safe from vulnerabilities, and used only for the purposes with which it was collected. Whether this data is an email address, a birthday, a personal identifier, or credit card numbers, the weight of trust placed on this...
Blog

Is FTP Dead?

  Is FTP still a viable option for sending file transfers? While organizations across all industries have started shifting to secure FTP protocols like SFTP and FTPS, a surprising number of businesses still use FTP to transfer sensitive documents across internal and external networks. The search "how to use FTP" comes up with over 163 million results...
Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

    Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020 Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll want to pay close...
Blog

Are SFTP Files Encrypted?

    The definitive answer to "Are SFTP Files Encrypted," is yes! SFTP, short for Secure Shell (SSH) File Transfer Protocol is a network protocol that organizations use to secure and send file transfers. SFTP is firewall-friendly, supports key-based authentication, encrypts usernames and passwords, and implements strong encryption algorithms. How...
Blog

I’ve Just Been Breached, Now What?

  So, you think (or perhaps you know) you’ve been breached. It’s every organization’s nightmare, and you’re living it, facing local and federal fines, upset customers, public panic, and a loss of intellectual property. A breach can be a harrowing ordeal; if you’re not sure what to do immediately after discovering the breach, your situation can quickly...
Blog

40 Cybersecurity User Groups, Forums & Communities to Join

  What is the best cybersecurity resource? Answer: other people! Today more than ever, people are connecting with each other over shared problems and interests. Maybe there’s a particularly tricky problem that’s taunting you. Maybe you have exciting best practices to share with other professionals. Whether you’re a cybersecurity industry veteran, or...
Blog

The Key Differences Between SFTP and FTP

Last Updated 05/03/2024 Are SFTP and FTP the same? While they both transfer files, the answer to this question is ultimately, NO. Secure File Transfer Protocol or SSH File Transfer Protocol (SFTP) and File Transfer Protocol (FTP) are NOT the same thing. SFTP, not to be confused with FTP Secure (FTPS), is a network SFTP is an extension of the 2.0...
Blog

Everything You Need to Know About SFTP Automation

Last edited on 4/25/2024 There are many file transfer protocols that organizations could use within their workflows. Some organizations may simply be looking for a way to automate their file transfers. Whether you send a dozen file transfers a week, hundreds a day, or rely on SFTP in an enterprise-fashion, to transmit millions of files per day, SFTP...
Blog

How SFTP Works

How does SFTP work? When you need to secure server-to-server file transfers between yourself, your trading partners, and enterprise servers, SFTP (which stands for SSH File Transfer Protocol or Secure File Transfer Protocol) is a more secure option than FTP. Secure File Transfer Protocol (SFTP) works over the Secure Shell (SSH) data stream to...
Blog

Everything You Need to Know about FTP Automation Software

  So, you want to automate your FTP file transfers. Whether you send a dozen file transfers a week, hundreds a day, or even more, automation is a smart step for most businesses. The benefits are simple: automatic file transfers cut down on user errors, reduce or eliminate the need for scripts, free up manual time spent on creating and maintaining jobs,...
Blog

Which is Better: AS2 vs. SFTP?

Over the last several months, we’ve compared many different file transfer protocols, including SFTP vs. FTPS and SFTP vs. MFT, and MFT vs. Dropbox for secure file sharing. Today, we’re going to look at AS2 vs. SFTP. How do these popular file transfer protocols work? How do they differ? And most importantly, which one is better for your organization’s file exchange requirements? Let’s dive in. ...
Blog

Why You Should Never Use FTP to Transfer Cloud Files

  The cloud has become an increasingly popular topic among organizations in recent years. From sharing projects via cloud collaboration tools to exchanging files between a company and its trading partners using cloud storage buckets, cloud computing platforms like Microsoft Azure and AWS offer users a lot of flexibility over their day-to-day business...
Blog

Five Secure File Transfer Alternatives to FTP

Last Updated: 05/02/2024 The Need for Secure File Transfer Protocols “FTP served its purpose for its day, but it was never designed to offer up the level of security today’s organizations require, whether for compliance or to help prevent the enormous fiscal and reputational costs a data breach can bring about,” said Chris Spargen, Senior Manager,...