Blog

Blog

New Zealand Healthcare Agencies Required to Eliminate Fax Machine Use and Secure Emails for Compliance by 2020

  Image   Here’s what you need to know in order to make the transition and achieve compliance with HISF Chapter 8 by 2020 Are you part of a health agency or healthcare organization in New Zealand that uses traditional fax machines or other insecure data transfer methods to share patient information and communications? If so, you’ll...
Blog

Are SFTP Files Encrypted?

    Image The definitive answer to "Are SFTP Files Encrypted," is yes! SFTP, short for Secure Shell (SSH) File Transfer Protocol is a network protocol that organizations use to secure and send file transfers. SFTP is firewall-friendly, supports key-based authentication, encrypts usernames and passwords, and implements strong...
Blog

I’ve Just Been Breached, Now What?

  Image So, you think (or perhaps you know) you’ve been breached. It’s every organization’s nightmare, and you’re living it, facing local and federal fines, upset customers, public panic, and a loss of intellectual property. A breach can be a harrowing ordeal; if you’re not sure what to do immediately after discovering the breach,...
Blog

7 Benefits of Using MFT for Encrypted File Transfers

  Image   7 Benefits of Using MFT for Encrypted File Transfers   At minimum, a managed file transfer (MFT) solution is a product that encompasses all aspects of inbound and outbound file transfers while using industry-standard network protocols and seamless encryption. It can automate and transfer data across your network, systems...
Blog

The Key Differences Between SFTP and FTP

Image Last Updated 05/03/2024 Are SFTP and FTP the same? While they both transfer files, the answer to this question is ultimately, NO. Secure File Transfer Protocol or SSH File Transfer Protocol (SFTP) and File Transfer Protocol (FTP) are NOT the same thing. SFTP, not to be confused with FTP Secure (FTPS), is a network SFTP is an...
Blog

Everything You Need to Know About Open PGP Encryption

Image What is Open PGP? PGP is the backbone of Open PGP. It is an open source standard that allows PGP to be used in software that is typically free to the public. The term "Open PGP" is often applied to tools, features, or solutions that support open source PGP Encryption technology. It is Internet Engineering Task Force (IETF)...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

  Image If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want...
Blog

How to Encrypt Files in Linux

  Image If your organization uses Linux operating systems to run key business processes, it’s important to implement tried-and-tested Linux security practices that support critical files as they transfer from one system to another. One requirement that pops up frequently for Linux users is file encryption. Linux files need to be...
Blog

How to Prevent Data Breaches with MFT | Checklist and Plan

  Image You know what a data breach looks like in the movies... A character’s computer is suddenly overtaken by lines of green code. Windows and browsers pop up at lightning speed, as if the PC is possessed and has its finger on the fast-forward button. The main characters give each other horrified looks. "We’re being hacked!" a...
Blog

PGP vs. GPG: What's the Difference?

Image PGP, GPG, GnuPG, Open PGP. These terms file under the same category but refer to slightly different things. If you’re wondering what they mean or what the difference is between them, especially PGP vs. GPG, you’re not alone! Read this article to get a better feel for these standards and their nuances. PGP – Pretty Good Privacy ...
Blog

Five Secure File Transfer Alternatives to FTP

Image Last Updated: 05/02/2024 The Need for Secure File Transfer Protocols “FTP served its purpose for its day, but it was never designed to offer up the level of security today’s organizations require, whether for compliance or to help prevent the enormous fiscal and reputational costs a data breach can bring about,” said Chris...
Blog

Why You Should Incorporate Managed File Transfer into Your Cybersecurity Strategy

  Image Managed File Transfer: A New Cybersecurity Strategy for Sensitive Files Earlier this month, independent news platform Patch reported that Neiman Marcus, a department store chain in the US, has finally agreed to a settlement for their 2014 data breach. They’ll need to "pay $1.5 million and adopt measures to prevent hacks,"...
Blog

Data Breach and Incident Response Plans | 2019 Templates & Best Practices

  Image Every year, organizations hope that statistics for data breaches will improve, that things will be better than the year before. And every year, they are dismayed to discover that even though they’re pulling in new cybersecurity tactics to thwart cyber attacks, so are hackers pulling in new methods to discover their...
Blog

How 3 Financial Institutions Solve File Transfer Needs with MFT Software

  Image On a scale of 1-10, how would you rate the efficiency of your file transfers right now? If you use manual scripts, legacy software, or a myriad of free tools to balance your encryption, automation, cybersecurity, reporting, and collaboration needs, it’s possible you’ll rate your efficiency low on the scale. After all,...
Blog

The Best Cybersecurity Strategies for Banks and Financial Organizations

  Image Banks and financial institutions, take note: though the year is almost over, no one is safe from a data breach. Industries across the board have seen 4.5 million records stolen so far in 2018—a staggering 133% increase over those compromised in 2017. As you create updated cybersecurity plans and data breach prevention...
Blog

Why You Should Cluster Your File Transfer Systems

  Image What’s the true cost of downtime for your organization? You may think of it in terms of lost revenue—according to studies released in the last couple years, the average cost of system-wide downtime is $100,000 an hour, and that’s on the low end (it can get up to $300,000 or more). But there are other factors involved in the...
Blog

IT Pros in Healthcare: How to Choose a Secure File Transfer Solution

  Image Every healthcare provider wants to avoid being the next data breach headline—and unfortunately, we have seen many incidents and their consequences in 2018 so far. The causes of these data breaches range from wrongly configured databases to successful malware attacks and unauthorized user access. For those looking to avoid...
Blog

Is Your Data REALLY Safe on the IBM i (AS/400)?

  Image “AS/400 is built to be safe and reliable.” “No one makes viruses for the IBM i. There are no known cases of malware, either.” “IBM has amazing IBM i server security, so we don’t have to worry about vulnerabilities.” Do these statements sound familiar? Perhaps you’ve come across these claims in the industry, heard someone...
Blog

5 Ways to Protect Your Financial Organization from a Data Breach

  Image While several industries, including business and education, make up a big portion of yearly data breach counts, banks and credit unions aren’t left risk free. According to the Identity Theft Resource Center (ITRC), the banking/credit/financial sector totals 5.8% of 2017’s data breaches as of June 30, 2017. That’s up two...
Blog

Data Breach and Incident Response Plans | 2017 Templates & Resources

Image As we continue to put our data online, through social media channels, cloud storage, and email attachments, we open ourselves up to the possibility of data breaches and other attacks. The answer to this problem isn’t to stop using the internet, of course. But organizations today need to pay serious attention to their...