Blog

Blog

USPS Eliminates FTP, Requires Secure File Transfers

Early this year, the United States Postal Service (USPS) announced the elimination of FTP (File Transfer Protocol) from their business practices and policies—a change that strengthens the security of their data transmissions and addresses recent audit findings. What does this mean for you? The change is still in transition for now, but after August 31, 2017, mailers and shippers will need to send...
Blog

What is MFT and How Does It Work?

Compared to using a variety of standalone FTP and SFTP tools and scripts, managed file transfer (MFT) technology allows professionals to streamline how data is transferred. MFT helps organizations send and receive files in the cloud and across their private networks, create and control workflows, automate business processes, and centralize management from a single system. What is MFT? Managed file...
Blog

7 Steps to Protect Yourself Against Corporate Spear Phishing

Anyone with an email account is used to spam. It happens one day: you get that first unsolicited email, and then a flood of ads, flash sale offers, and foreign bank transaction requests rushes into your inbox. In that moment, the battle for your virtual sanity begins. But while spam emails are mostly harmless—you tend to see them from a mile away and respond accordingly—spear phishing emails are...
Blog

8 Ways to Protect Your Healthcare Organization from a Data Breach

In 2020, there were 642 data breaches of healthcare organizations . That’s a new record, up 25 percent from the previous year. In these breaches, the records of millions of Americans were exposed. These incidents occurred at all types of organizations in the industry, including clinics, insurance providers and their health system business associates. If you’re in the healthcare industry, here are...
Blog

A Reflection on NAB: Media Industry Trends, Challenges and How the Industry is Responding

After getting back from the NAB show this year, I have been thinking about some of the media industry trends that present changes, as well as the opportunities. The industry as a whole has been in a state of change: the content itself is rapidly becoming larger, workflows are changing and becoming more dispersed, the way we archive media is changing and the way we consume media is evolving. This...
Blog

MFT Agents: Definition, Differences and Use Cases

In GoAnywhere’s latest product release of its Managed File Transfer solution , MFT agent capabilities were introduced. The following resource aims to help readers understand what MFT agents are, the difference between a traditional MFT deployment and an MFT agent deployment and some example use cases. For further questions, open the Live Chat box at the bottom right of this page or send us an...
Blog

Top Takeaways from the 2017 Cybersecurity Trend Report

Note from the Editor: This article shares highlights from an older report. For the latest on data security and best practices for keeping file transfers safe, visit our Data Security page or check out the latest additions to our blog . Do you ever wish you knew how other businesses are dealing with today’s security threats? The 2017 Cybersecurity Trends Report, recently released by Crowd Research...
Blog

The State of File Transfer Security

Note from the Editor: This article shares highlights from an older report. For the latest on data security and best practices for keeping file transfers safe, visit our Data Security page or check out the latest additions to our blog . The 2017 Cybersecurity Trends Report was recently released by Crowd Research Partners. The report covers many aspects of cybersecurity, such as general security...
Blog

How to Create a Cybersecurity Policy for Your Organization

The cyberattacks and data breaches that make the news are usually the ones that happen at big corporations like TJX or Home Depot. But every organization, large or small, needs to be concerned about cybersecurity. According to Security Magazine , the average cost of a data breach for a small business is between $36,000 and $50,000 . And while the proportion of small businesses becoming data breach...
Blog

TransferAgent Brings the Power of Filecatalyst to the Simplicity of a Web Browser

I just finished watching a webinar our president, John Tkaczewski, gave on the new version 4.9.9 of FileCatalyst Workflow and it was a great learning experience. He gave an in-depth overview of TransferAgent and outlined its features past and new. It was really interesting stuff, so I thought I would write a blog article that outlines some of these new features. Consider this a supplementary piece...
Blog

SSL and file transfers, the marriage of all marriages

The support team here at FileCatalyst team polled our customers who are using FileCatalyst Central v3.6 and asked what type of improvements they would like to see in our next release of Central. Security was a topic of interest to our customers, and they were asking us about the things we are doing in terms of security. With this in mind, we have taken steps with SSL that has secured our software...
Blog

Still Using SHA-1 to Secure File Transfers? It’s Time to Say Goodbye

Securing information is rising in importance for organizations worldwide. Using outdated technology is extremely risky, yet many organizations continue to do so because of legacy systems that don’t allow them to upgrade, lack of resources and time to upgrade, or they are simply unaware of the risks. The commonly used SHA-1 algorithm is a perfect example of an obsolete encryption standard that...
Blog

HIPAA Compliance: Guide Details How MFT Helps

Are your file transfers HIPAA compliant? Is your healthcare organization at risk for fines, or worse - a data breach of sensitive patient information? Many healthcare IT teams meet these broad questions with unease. After all, the ramifications of a healthcare data breach can impact organizations and individuals for years to come as well as have a severe impact on an organization’s bottom line and...
Blog

Why Healthcare Organizations Need a Secure Data Transfer Solution

The last few years were scary in terms of healthcare cybersecurity. A hack of Banner Health breached up to 3.7 million records. Another data breach at 21st Century Oncology resulted in multiple lawsuits being filed against the organization. When a third party gained unauthorized access to computer systems at Valley Anesthesiology and Pain Consultants , almost 900 thousand patients, employees, and...
Blog

10 Shocking PCI DSS Compliance Statistics

If you work for any organization that processes credit or debit card information, you’ve heard of the Payment Card Industry Data Security Standard (PCI DSS), the regulatory standard aimed at preventing costly data breaches like the ones you may have heard about at Home Depot or TJX . But how much do you really know about PCI DSS compliance? Here are some interesting PCI DSS compliance statistics...
Blog

3 Data Breaches That May Have Been Avoided through PCI DSS Compliance

"Dear Valued Customer, As you may have heard, on September 8, 2014, we confirmed that our payment data systems have been breached, which could potentially impact customers using payment cards at our U.S. and Canadian stores." This is an excerpt from an actual email distributed by a large retailer, in the wake of a massive data breach jeopardizing over 50 million credit cards. Since 2004, Payment...
Blog

SFTP vs. FTPS: The Key Differences

With so many options for transferring files , it can be confusing to answer the most important question: what is the best way to secure your company’s data during transfer? Use this article as an introduction to the differences between two mainstream secure FTP protocols , SFTP and FTPS, and which is the best choice to protect your file transfers. What's the Difference: SFTP vs. FTPS Both FTPS and...
Blog

Moving Big Data in the Oil & Gas Industry

Did you know it takes over $100 million to drill a deep-water well? Holding true to the cliched phrase oil and gas companies know all too well: it takes money to make money. The deep digging associated with the oil and gas industry requires equally deep pockets. When it comes to making the big business decisions required in the oil and gas industry, major companies like Shell, BP, Chevron, BHP...
Blog

No Such Thing as a Free File Transfer, Part 3: Are Your File Transfers Holding Back Business Growth?

One of the most common reasons businesses have for not optimizing processes or implementing modern software solutions is simply that “we’ve always done it this way.” We get it—sure, your file transfer process is a little time-consuming and your FTP tool doesn’t have the most up-to-date security features , but your business is doing fine. Why spend the time and money to implement a new solution...
Blog

No Such Thing as a Free File Transfer, Part 2: Cost-effective Security

With new corporate data breaches in the news seemingly every day, it’s no surprise that security is a top concern for IT professionals. However, file transfers are an area where many companies are still vulnerable. Most file transfers still use FTP, a protocol that comes with inherent risks . Other common file transfer solutions, like file sharing apps, come with their own security concerns. This...