Blog

Blog

The Top 10 Healthcare Data Breaches of 2020

  2020 Was the Worst – in Healthcare Data Breaches Data breaches can have catastrophic consequences on those who are unfortunate enough to suffer from one. From steep costs and/or fines (in the millions) to a ruined reputation, data breaches are not to be taken lightly. This is especially true for the healthcare industry, where sensitive patient data,...
Blog

Improve Your Big Data File Transfers: 11 Security Features to Consider

  New challenges and new opportunities have arisen due to big data, which is altering the nature of file transfer technology. The Good News Big data is leading to new file sharing technology, which is making it easier to solve certain big data file transfer problems. On the other hand, it is increasing the bandwidth requirements companies face,...
Blog

TFTP vs. FTP vs. FileCatalyst: What is the Difference?

Transferring files over the internet is a common task in today’s digital world and it’s important to  protocol that fits your organization’s needs. A protocol is a set of rules and messages between a sender and a receiver. It functions much like a language that both ends of the network understand so the data arrives uncorrupted and with a proper file name. When it comes time to choose a protocol,...
Blog

PGP vs. Open PGP: What’s the Difference?

    Encryption standards become more and more important every day. With the rise of data breaches, it’s critical now more than ever for organizations to raise the level at which they protect their information. Partly, educating employees has presented itself as an easy way to make data safer. However, taking the time to choose the right method of...
Blog

What is the Canadian Communication Security Establishment?

  What is the CSE? The CSE is one of Canada’s key security and intelligence organizations, specializing in cryptology. CSE stands for Communications Security Establishment or Centre de la sécurité des télécommunications. As a cybersecurity leader in Canada, it has three main duties: Collecting foreign signals intelligence, aka intercepting...
Blog

Data Security Best Practices Every CISO Should Know

  Aligning Data Security with Organizational Strategy The responsibility for an organization’s information and data security is a hefty one, knowing each day that it’s not a matter of whether a cybersecurity attack will happen, but rather when it will happen on your watch. Whether data is grabbed in a headline-making breach of a well-known entity, or...
Blog

How to Use MFT as a Workflow Automation Tool in Healthcare

  When it comes to managed file transfer (MFT) solutions, organizations across industries find them valuable for policy enforcement, user access control and authorization, risk reduction, and more. And when it comes to HIPAA and HITECH requirements, MFT shines as a secure workflow automation tool. MFT as a B2B Enabler What makes MFT a perfect...
Blog

Consolidate Your File Transfers with GoAnywhere MFT

  Consolidation is the Stepping Stone to Successful File Transfers When you’re utilizing a managed file transfer (MFT) solution, consolidation is an impactful mechanism that helps you to make the most out of your file transfers. With GoAnywhere MFT, you can successfully bring together multiple different technologies and platforms all under one...
Blog

How Cloud Technology is Transforming the Healthcare Industry

  When you think of files in healthcare, you may think of illegible doctor notes, clipboards with unpronounceable drugs, or a hastily printed summary of your visit. The healthcare industry generates a lot of paperwork that makes its way into many hands, so how can healthcare organizations keep it flowing to the right places – and do so securely? Many...
Blog

Should You Use PGP or GPG Encryption?

  Not every piece of information is meant for every pair of eyes. That’s why organizations count on encryption technology – to lock down their sensitive data from malicious acquisition or even human error. And, when it comes to those encryption protocols, you’ve got options. One choice you or your IT team might need to make is whether to use PGP or GPG...
Blog

What is Health Level Seven (HL7)?

    What is HL7?   HL7, short for Health Level Seven, is a set of international Electronic Data Interchange (EDI) standards used to provide guidance with the transfer and sharing of clinical and administrative data between software applications used by various healthcare providers. These standards focus on the Application Layer, or “layer 7” in the...
Blog

Can HIPAA-Certified Solutions Really Guarantee Compliance?

  When searching for a new software solution to meet your organization’s needs, it’s easy to see the labels “HIPAA-Certified” or “HIPAA Compliant” and believe your bases are covered. After all, “HIPAA-Certified” means the product or application follows HIPAA’s privacy rules and has everything in place to protect your health and patient information,...
Blog

How to Measure Network and Disk Throughput with IPERF3

FileCatalyst is a file transfer acceleration tool. Like any software, it is still limited by the performance of the hardware and the network on which it is used. If you are trying to achieve speeds faster than 1 Gbps, with FileCatalyst, read on. If you already know you’ll need to transfer files faster than 1Gbps, before installing FileCatalyst use...
Blog

What is GPG?

  What is GPG? GPG, also known as GNU Privacy Guard (GnuPG), is a different adaption, but popular implementation of the Open PGP standard as defined by RFC 4880. GPG in Depth GPG is an open-source standard and strong alternative to the official PGP software owned by Symantec. It was developed by Werner Koch and released in 1999 as an alternative to...
Blog

Encryption for Exchanging Files

  You seal the envelope when you send a letter. You lock your car when you park at the big box store. You track your packages to make sure porch pirates don’t get them before you do. Your file exchanges should be no different. Learn the essentials on how you can keep your data secure both while it’s sitting at home or being delivered. What is...
Blog

Moving Big Data to Amazon S3 Storage at Maximum Speed

If your data storage strategy includes cloud object storage, you will have to consider the tools that will be used to move this data and access it once it’s all migrated to the cloud. Luckily, when it comes to object storage, all the vendors will provide you with a range of quality tools out-of-the-box and options to move and access your data. If your data set is very large, access time...
Blog

What is Safer Internet Day?

    Safety First: It’s Safer Internet Day!   Each February, more than 100 countries around the world take note of the massive power of the internet and more importantly, the urgency surrounding how to be safer and better users of the internet, especially those younger users. In the U.S., Safer Internet Day is recognized on Feb. 9. Why Was Safer...
Blog

What is SSL, TLS, and HTTPS?

    Meet the Trio   SSL, TLS, and HTTPS are a unique trio that each work to help keep your important data secure on the Internet. If you've ever wondered how each of these protocols compares, you’ve come to the right place. Here are the basics and how they operate. Know the Terms: GoAnywhere Glossary   What is SSL? SSL, short for Secure Sockets...
Blog

Top Data Breaches of 2020: How You Can Minimize Your Risks

  Despite the many changes that 2020 brought, including new home offices, new (and quickly abandoned) hobbies, and new threats, some things stayed the same: numerous data breaches, disruptive hacks, and staggering fines. We thought 2019 was a momentous year for data breaches, and it even earned the name “the worst year on record” before the end of...
Blog

The Top 7 Cybersecurity Strategies for Your Business in 2021

  Did you know that the average cost of a data breach is $3.92 million and almost 30% of all organizations will experience at least one breach over the next 24 months? Besides the immediate cost, such as data loss and regulatory fines, organizations also suffer from tarnished reputations, eroded customer trust, the cost of other remedial measures, and...