Blog

Blog

SFTP and the Cloud: How to Transfer Your Data Securely

  Image Is SFTP Cloud Based? SFTP, Secure File Transfer Protocol, is a protocol used to transfer files between your organization, trading partners, and enterprise servers. It helps to establish a secure data connection and protect files in transit. SFTP can be used for your cloud file transfer needs, but also for any on-premises...
Blog

What is Cryptojacking?

  Image   Cryptocurrency and Cryptojacking Make a Dangerous Pair   With the rise in popularity of cryptocurrencies (electronic money) and their increasing acceptance as a legitimate way to purchase goods and services online, it didn’t take long for cryptojackers or cryptohackers to begin devising their schemes to mine...
Blog

The State of Financial Services Cybersecurity

  Image From Robin Hood to Bonnie and Clyde to Equifax, banks and the finance industry have been in jeopardy since the beginning of recorded history. For one, banks and financial services are enticing targets. The promise of a big payout, whether by breaching the vault or ransoming sensitive personal data, is what keeps would-be bank...
Blog

What is Computer Security Day?

  Image   News Flash: It’s Computer Security Day!   Today, November 30, is Computer Security Day! These days, electronic devices like smartphones, tablets, and computers are a huge part of our everyday lives. They impact how we socialize, how we work, how we get around, and so much more. Although communication has become easier,...
Blog

When to Use FTP vs. FTPS or SFTP

  Image   The Classics: FTP, FTPS, & SFTP   FTP, FTPS, and SFTP are three of the key protocols for transferring files. However, just because a protocol is a classic, doesn’t mean you should be using it for every kind of file transfer. If you’re not sure what protocol you should be using and for what situations, this is the...
Blog

New Tech and New Hacks: How Are Cyber Risks Changing?

  Image Like much of the tech world, cybersecurity is constantly moving forward. New data security requirements, new best practices, and new threats mean that standing still is risking being left behind. Choices that were made one, five, or 10 years ago may not hold up to the latest best practices or hacking threats, and could hold...
Blog

Compliance for Healthcare: Secure File Transfer Holds the Key

  Image Complying with your doctor’s recommendations is the primary key to feeling good and staying healthy. Complying with the healthcare industry’s security standards and personal data protection requirements holds the key to avoiding an audit failure, paying steep fines, or trying to heal from the impact of a data breach. Sure,...
Blog

TFTP vs FTP: Or is There a Better Option?

  Image When it comes to transferring sensitive data, there’s nothing trivial about it. The risks of doing it insecurely are high; the costs of a data breach – astronomical. So, if you’re still using TFTP (Trivial File Transfer Protocol) or slightly more secure FTP (File Transfer Protocol) to transfer your organization’s files you...
Blog

Problems with FTP (And How to Solve Them)

FTP''s vulnerabilities make it unsuitable for most secure file transfer needs, including its lack of security features, unreliability, outdated processes, and more. There are better alternatives, including Managed File Transfer (MFT).
Blog

The Cybersecurity Dangers of the Dark Web and How to Protect Your Organization

  Image Even as cybersecurity experts and researchers declare that the “underground golden age is over” as its top marketplaces are raided or close their doors, the dark web continues to thrive. In fact, Darkode, one of the most well-known hacking forums and black markets, recently reopened. And what are some of the most common wares...
Blog

What is Electronic File Transfer?

  Image Meet Electronic File Transfer If your IT department is still relying on outdated methods like FTP, PC tools, or legacy scripts to meet your organization’s data transfer needs, now is the time to consider a better option – an electronic file transfer solution. What is Electronic File Transfer? Electronic File Transfer (EFT)...
Blog

Cybersecurity for Small Businesses | Plans and Templates

  Image News about data breaches that affect big businesses and brands make the front pages. News about a cybersecurity hit on the neighborhood hardware store or the local pharmacy or coffee shop only seem to make headlines at the dinner table. If you own or manage a small or family business, it’s vital that you take steps to...
Blog

TFTP vs. SFTP: The Key Differences

  Image What do “T” and “S” have in common? If you add them to FTP you can create an entirely new protocol! FTP + S becomes either SFTP or FTPS, and by adding a second “T,” you get TFTP (Trivial File Transfer Protocol). While FTP isn’t recommended for transferring files securely, SFTP and FTPS are solid replacement choices – but...
Blog

3 Lessons Learned from a Data Breach

  Image Data breaches have been plaguing organizations for years and the numbers continue to climb. After a breach, an organization goes into survival mode — trying to recover data, reestablish trust, and ensure they can keep their business running. It’s understandable that there isn’t much leisure time to sit back and reflect on...
Blog

5 Ways to Tighten Cybersecurity Working from Home

  Image Logistically, you’re good to go: employees are working from their home offices, spare rooms, and kitchen counters as if they’ve always been doing it, IT is keeping things chugging along on the back end, and you’ve even ironed out the kinks in video call happy hours. Now that your employees can successfully work from home, it...
Blog

How to Help Ensure Compliance with Data Privacy Laws

  Image How to Help Ensure Compliance with Data Privacy Laws If complying with data privacy laws like the GDPR, PDPA, CPA, HIPAA, PCI DSS, PIPEDA, and more sometimes feels like swimming in alphabet soup, there is a life preserver that can simplify, secure, and automate the processes involved. Managed file transfer can proactively...
Blog

How a Data Security Breach Puts Your Organization at Risk

  Image Data breaches are, unfortunately for organizations everywhere, becoming likely events rather than worst-case scenarios, as more and more organizations are learning. There are a variety of safeguards businesses can implement to reduce their risk, but even with good data security in place, a breach can happen. So, what do you...
Blog

How GoAnywhere MFT Helps the Healthcare Industry Thrive

  Image GoAnywhere MFT is Just What the Doctor Ordered The healthcare industry is a complex system full of regulations to comply with and highly sensitive data to move from one location to the next. From dramatic cost cutting, to eliminating manual processes, to strengthening data encryption and more, GoAnywhere Managed File...
Blog

Key Cybersecurity Takeaways from the EasyJet Data Breach

  Image A data breach can wreak financial and logistical havoc for companies who experience them, not to mention customers, employees, and others who depend on or work with the breached organization. And even though it seems like data breaches are becoming more pervasive, they continue to severely impact organizations’ carefully...
Blog

Top 3 Things to Look for in a Remote Collaboration Tool

  Image   Feel Like You're Working Together — Even From Apart Finding the best way to securely collaborate on and share files can be difficult in the best of times. With large swathes of people working from home for the first time, finding the solution that meets your business requirements is paramount. Content collaboration...