Blog

Blog

How SFTP Works

Image How does SFTP work? When you need to secure server-to-server file transfers between yourself, your trading partners, and enterprise servers, SFTP (which stands for SSH File Transfer Protocol or Secure File Transfer Protocol) is a more secure option than FTP. Secure File Transfer Protocol (SFTP) works over the Secure Shell (SSH...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

  Image If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want...
Blog

How to Encrypt Files in Linux

  Image If your organization uses Linux operating systems to run key business processes, it’s important to implement tried-and-tested Linux security practices that support critical files as they transfer from one system to another. One requirement that pops up frequently for Linux users is file encryption. Linux files need to be...
Blog

Everything You Need to Know about FTP Automation Software

  Image So, you want to automate your FTP file transfers. Whether you send a dozen file transfers a week, hundreds a day, or even more, automation is a smart step for most businesses. The benefits are simple: automatic file transfers cut down on user errors, reduce or eliminate the need for scripts, free up manual time spent on...
Blog

How to Prevent Data Breaches with MFT | Checklist and Plan

  Image You know what a data breach looks like in the movies... A character’s computer is suddenly overtaken by lines of green code. Windows and browsers pop up at lightning speed, as if the PC is possessed and has its finger on the fast-forward button. The main characters give each other horrified looks. "We’re being hacked!" a...
Blog

Which is Better: AS2 vs. SFTP?

Over the last several months, we’ve compared many different file transfer protocols, including SFTP vs. FTPS and SFTP vs. MFT, and MFT vs. Dropbox for secure file sharing. Today, we’re going to look at AS2 vs. SFTP. How do these popular file transfer protocols work? How do they differ? And most importantly, which one is better for your organization’s file exchange...
Blog

PGP vs. GPG: What's the Difference?

Image PGP, GPG, GnuPG, Open PGP. These terms file under the same category but refer to slightly different things. If you’re wondering what they mean or what the difference is between them, especially PGP vs. GPG, you’re not alone! Read this article to get a better feel for these standards and their nuances. PGP – Pretty Good Privacy ...
Blog

Why You Should Never Use FTP to Transfer Cloud Files

  Image The cloud has become an increasingly popular topic among organizations in recent years. From sharing projects via cloud collaboration tools to exchanging files between a company and its trading partners using cloud storage buckets, cloud computing platforms like Microsoft Azure and AWS offer users a lot of flexibility over...
Blog

Five Secure File Transfer Alternatives to FTP

Image Last Updated: 05/02/2024 The Need for Secure File Transfer Protocols “FTP served its purpose for its day, but it was never designed to offer up the level of security today’s organizations require, whether for compliance or to help prevent the enormous fiscal and reputational costs a data breach can bring about,” said Chris...
Blog

Which is Better: Free SFTP Software vs. Enterprise-Level SFTP Software?

Free SFTP Software vs. Enterprise-Level SFTP Solutions In general, people like free things. Beverages, company lunches, swag at tradeshows and conferences, t-shirts and socks, those intriguing items in the “For Free” box at your local yard sale… You can’t go wrong with free, right? Well, coffee you don’t have to pay for is great, but the adage “There’s no such thing as a free...
Blog

What is Secure File Transfer?

  Image Moving sensitive, often-proprietary files from one person—or organization—to another has become a complex aspect of the business world today. This complexity comes not only from the size and number of files that need to be shared, but also from the need to protect them at all points during their journey from sender to...
Blog

Why You Should Incorporate Managed File Transfer into Your Cybersecurity Strategy

  Image Managed File Transfer: A New Cybersecurity Strategy for Sensitive Files Earlier this month, independent news platform Patch reported that Neiman Marcus, a department store chain in the US, has finally agreed to a settlement for their 2014 data breach. They’ll need to "pay $1.5 million and adopt measures to prevent hacks,"...
Blog

Data Breach and Incident Response Plans | 2019 Templates & Best Practices

  Image Every year, organizations hope that statistics for data breaches will improve, that things will be better than the year before. And every year, they are dismayed to discover that even though they’re pulling in new cybersecurity tactics to thwart cyber attacks, so are hackers pulling in new methods to discover their...
Blog

What is FTPS?

  Image Whether you’re looking to upgrade from your current FTP file transfers or have new requirements from a trading partner or customer, you might be wondering what FTPS is. You may ask: how does FTPS work, and does it differ from secure file transfer protocols like SFTP and AS2? Good questions. Let’s start by defining what FTPS...
Blog

Which is Better: SFTP vs. MFT?

  Image SFTP, or MFT: that is the question. Even though we’re not all famous poets like William Shakespeare, many IT professionals will ask this question at some point or another. Should they use an SFTP or managed file transfer (MFT) solution to transfer sensitive files securely—and why? It brings up an interesting choice. By...
Blog

The Best Cybersecurity Strategies for Banks and Financial Organizations

  Image Banks and financial institutions, take note: though the year is almost over, no one is safe from a data breach. Industries across the board have seen 4.5 million records stolen so far in 2018—a staggering 133% increase over those compromised in 2017. As you create updated cybersecurity plans and data breach prevention...
Blog

Why You Should Cluster Your File Transfer Systems

  Image What’s the true cost of downtime for your organization? You may think of it in terms of lost revenue—according to studies released in the last couple years, the average cost of system-wide downtime is $100,000 an hour, and that’s on the low end (it can get up to $300,000 or more). But there are other factors involved in the...
Blog

Which is Better: SFTP vs. FTPS?

  Image How do you transfer sensitive files? Business requirements and security standards have increased in recent years across industries and continents, but many organizations have struggled to keep up. Manual scripts, legacy tools, and single-use software are still utilized by IT and security teams despite their risks, causing...
Blog

SFTP: The Smart Way to Transfer Your Cloud Data

  Image With the growing buzz about everything "cloud computing," most organizations are either starting to consider the cloud or have already moved some of their business processes to a cloud platform. No matter where you stand, technology is no stranger to the cloud. Consumers use cloud applications, services, and storage daily,...
Blog

10 Essential Tips for Securing FTP and SFTP Servers

  Image Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers, putting your FTP or SFTP server at risk of a costly data breach. Bob Luebbe, GoAnywhere Chief Architect at Fortra, hosted a...