Blog

Blog

Tainted Love, Ransomware, and More: This Month in Cybersecurity

February, while a short month, was long on cybersecurity threats. Read on for a few of the high- (well, low-lights) as well as for some resources from GoAnywhere MFT on how you can help secure your sensitive data files while they are in motion and in transit. Love Hurts The search for love turned up more than potential partners over the last...
Blog

Fast File Transfer Terms You Should Know

When looking for an accelerated file transfer solution, you may run into an alphabet soup of acronyms and abbreviations. We’re here to help you on your quest to find the fastest file transfer solution for your business needs by clarifying what these many terms mean, and why you should care about them. First, what exactly is fast file transfer, and how much faster is it than standard file transfer...
Blog

How the Coronavirus Has Changed Data Security

COVID-19 Has Made a Lasting Impact on Data SecurityThe Coronavirus pandemic has altered many things in this world and data security is no exception. Along with the solid impact COVID-19 has made on data security, let’s highlight some of the other key ways lasting change has been made within businesses.The Lasting Change: Working from HomeAs of 2022,...
Blog

How to Send Big Files Quickly

Big and fast. Speedy and large. It’s a combination that’s sometimes tricky to execute, especially when it comes to sending large data files rapidly. Do you sacrifice speed? Do you risk having files interrupted mid-stream? Or do you roll the dice and hope your file won’t be rejected from the starting gate? You don’t have to make these kinds of...
Blog

Still WFH? Time to Revisit BYOD, Security, and More

Work from home, which was once an early-pandemic precaution, is becoming a norm across industries. It is likely that the pandemic has shifted how people work forever, with half of employees expecting to work predominantly from home or in a hybrid home-and-office system going forward. However, just as in the early days of the pandemic,...
Blog

What is Shadow IT and Why is it a Problem?

Shadow IT Doesn’t Lurk in the Shadows – it's PrevalentAlthough it may seem foreign now, there was once a time when an organization’s IT department had complete and total control over the technology being used by the organization. Before software could be purchased, or before anyone clicked download, the IT Director’s blessing was needed.In current...
Blog

The 10 Biggest Data Security Breaches of 2021

2021 Was Not Fun for Those Who Suffered a Data BreachAlthough 2021 brought about many positive changes and more of a return to normalcy, it did not bring fun times for the many organizations who suffered from costly data breaches.With the numbers, costs, and impacts of a data breach on the rise, it’s important to do what you can to protect your...
Blog

Dropbox File Transfer Acceleration

What is Dropbox? Dropbox is a file hosting and sharing service used both as a personal cloud storage solution and as a file collaboration tool for businesses. It supports most types of files, including text, video, graphics, and audio. Because Dropbox is cloud-based, you can use it from anywhere. This makes it a top choice for those who work from home or on location rather than in the corporate...
Blog

What is Mobile Malware?

Meet Mobile Malware Mobile malware is a malicious kind of software that hackers use to specifically target and collapse operating systems on smartphones, tablets, and smartwatches in order to steal confidential data. Generally speaking, mobile devices aren’t as secure as computers. So, it’s not a stretch that the same security measures organizations...
Blog

What is Encrypted File Sharing?

What is Encrypted File Sharing?Whether you’re sending data back and forth for edits or accessing a shared document, file security is important. Encrypted file sharing is a method of securely exchanging data either internally or externally by encoding data and protecting its transmission.Data encryption uses algorithms to scramble the contents of files...
Blog

What is SOC 2 and Why it Matters for Security

There are some things in life that should be a given: rollercoasters are inspected regularly, chefs wash their hands, and your organization’s file transfers are secure.That last is a little more nebulous to see immediate cause-and-effect (it’s not like your rollercoaster car rolling off the tracks or getting food poisoning!) but unsecure file...
Blog

What is Zero Knowledge Encryption?

What is Zero Knowledge Encryption?If zero knowledge means every piece of information is absolutely confidential, and all data remains only with the user of a software or service, how does zero knowledge apply to encryption?Zero knowledge encryption basically states that data is kept secure via a unique user or encryption key, one that even the...
Blog

What is the DROWN Attack?

What is the DROWN Attack? The Decrypting RSA with Obsolete and Weakened eNcryption (DROWN) Attack is a serious vulnerability that affects HTTPS and other servers that rely on Secure Sockets Layer (SSL)/Transport Layer Security (TLS). Essentially DROWN is an attack vector that leverages a cross-protocol bug in servers that support modern...
Blog

Developing a Plan for Data Risk Management

What is Data and Risk Management?Data and risk management encompasses the processes and procedures an organization follows to safeguard the data it collects and stores. Data is today’s biggest asset—and today’s biggest target. If your organization has data, no matter now little or how sensitive, it’s at risk for leakage, theft, or attack. Sorry, that...
Blog

What is iPerf and How to Use It

What is iPerf?iPerf, which is short for Internet Performance Working Group, is an open-source speed test and network performance measurement tool. The mechanism is fairly simple: it creates TCP and UDP streams, and sends traffic from one host to another, then reports the maximum bandwidth to the user. This allows users to determine network throughput and top bandwidth speed.Originally called ttcp...
Blog

Is MFT Dead?

As cybersecurity technology continues to advance, some might ask whether secure MFT is fading away as a viable option for organizations to use for their file transfer needs. If organizations do choose to utilize MFT for their secure file transfer purposes, they will certainly select the best MFT software they can. The bottom line is that MFT will not...
Blog

How Big Are Movie Files?

Gone are the simple days of moving pictures and practical effects. These days, movies are more sophisticated, with computer-generated special effects and high-resolution images. However, each addition to a film or episode adds to the file size, which can make both downloading for at-home viewing and the process of creating the project more complicated than ever before. While large movie files...
Blog

File Transfer for Live Events

There are many organizations that require the ability to transfer large files fast, sometimes in the moment, to manage the requirements of live events. Fast media file transfer is important for many organizations and events: as they say, time is of the essence and live events are no exception. For organizations looking for a speedy solution to their live event needs, there is a solution that...
Blog

The 5 Biggest Cybersecurity Threats of 2022: How to Avoid Cybersecurity Attacks

Cybersecurity is one of the biggest issues of our time. Organizations are gradually investing more and more into cybersecurity. Microsoft expects to be investing upwards of $1 billion a year on cybersecurity for the foreseeable future and they certainly won’t be the only organization to increase their spending. In 2019, organizations began...