Blog | Fortra's GoAnywhere

Blog

Blog

Dropbox File Transfer Acceleration

What is Dropbox? Dropbox is a file hosting and sharing service used both as a personal cloud storage solution and as a file collaboration tool for businesses. It supports most types of files, including text, video, graphics, and audio. Because Dropbox is cloud-based, you can use it from anywhere. This makes it a top choice for those who work from home or on location rather than in the corporate...
Blog

What is Mobile Malware?

Meet Mobile Malware Mobile malware is a malicious kind of software that hackers use to specifically target and collapse operating systems on smartphones, tablets, and smartwatches in order to steal confidential data . Generally speaking , mobile devices aren’t as secure as computers. So, i t’s not a stretch that the same security measures organizations have in place for workstations and servers...
Blog

What is Encrypted File Sharing?

What is Encrypted File Sharing? Whether you’re sending data back and forth for edits or accessing a shared document, file security is important. Encrypted file sharing is a method of securely exchanging data either internally or externally by encoding data and protecting its transmission. Data encryption uses algorithms to scramble the contents of files so that they can’t be read without the...
Blog

MFT’s Role in Data-Centric Security

What is Data-Centric Security and is MFT a Part of It? When an organization’s security focus encompasses the varied technology, approaches, and policies that zero in on protecting the actual data organizations are entrusted with, versus merely the infrastructure, that strategy is considered data centric. And yes, managed file transfer (MFT) is one of the key solutions in a data-centric security...
Blog

Why You Should Invest in MFT

Let’s Look Forward As we approach the New Year, the importance of secure file transfers is only going to grow as cybersecurity threats expand and more and more sensitive data needs to be exchanged. So, let’s look forward and see why now is the perfect time to invest in a secure managed file transfer solution like GoAnywhere Managed File Transfer (MFT). Recent Market Trends MFT software and...
Blog

What is SOC 2 and Why it Matters for Security

There are some things in life that should be a given: rollercoasters are inspected regularly, chefs wash their hands, and your organization’s file transfers are secure. That last is a little more nebulous to see immediate cause-and-effect (it’s not like your rollercoaster car rolling off the tracks or getting food poisoning!) but unsecure file transfers could put sensitive data at risk, impacting...
Blog

What is Zero Knowledge Encryption?

What is Zero Knowledge Encryption? If zero knowledge means every piece of information is absolutely confidential, and all data remains only with the user of a software or service, how does zero knowledge apply to encryption? Zero knowledge encryption basically states that data is kept secure via a unique user or encryption key, one that even the application developer does not know. You, and only...
Blog

What is the DROWN Attack?

What is the DROWN Attack? T he Decrypting RSA with Obsolete and Weakened eNcryption (DROWN) Attack is a serious vulnerability that affects HTTPS and other serv ers that rely on Secure Sockets Layer (SSL)/Transport Layer Security (TLS). Essentially DROWN is an attack vector that leverages a cross-protocol bug in servers that support modern TLS by taking advantage of their support for the insecure...
Blog

Developing a Plan for Data Risk Management

What is Data and Risk Management? Data and risk management encompasses the processes and procedures an organization follows to safeguard the data it collects and stores. Data is today’s biggest asset—and today’s biggest target. If your organization has data, no matter now little or how sensitive, it’s at risk for leakage, theft, or attack. Sorry, that’s a little melodramatic—but cybersecurity...
Blog

What is iPerf and How to Use It

What is iPerf? iPerf, which is short for Internet Performance Working Group , is an open-source speed test and network performance measurement tool. The mechanism is fairly simple: it creates TCP and UDP streams, and sends traffic from one host to another, then reports the maximum bandwidth to the user. This allows users to determine network throughput and top bandwidth speed. Originally called...
Blog

What Are Self-Service MFT Capabilities?

What Are Self-Service MFT Capabilities? The act of self-service is a simple action to provide the capability for business users to do the work and carry out tasks themselves. S elf -service capabilities should be simple and effectiv e, ensure security standards are adhered to, meet compliance regulations, and elevate the potential of your managed file transfer (MFT) solution. How Does Self-Service...
Blog

Is MFT the Next Big Integrating Technology?

Is MFT Integration Software? MFT, which stands for managed file transfer, is not, strictly speaking, integration software. Managed file transfer at the most basic level is a transfer tool designed to get your data from A to B securely. Despite that, many MFT solutions take over the functions of everyday file transfer tools and scripts—automation, security, translation, and more—and brings them...
Blog

Diversity and Inclusion, Government Action, Organizational Risks: This Month in Cybersecurity

Each month we break down some of the bigger cybersecurity news and tips for organizations to stay in the know and make informed decisions around their cybersecurity plans. From diversity and inclusion to government movements to protect businesses and agencies from potential cybersecurity attacks, as well as the latest information about organizational weaknesses that U.S. organizations share, this...
Blog

The Difference Between Data Privacy, Data Protection, and Compliance

Data privacy, data protection, and compliance: they’re similar, but not the same. If you’re like most IT professionals, you may have used these terms interchangeably, and with good reason: all data privacy laws deal with protection, many data protection laws have privacy at their heart, and both outline compliance requirements. But what exactly is data privacy, and how is it related to data...
Blog

Data Breaches in Small Business

Data Breaches in Small Business are a Dime a Dozen No business is too small to be targeted in a data breach. In fact, according to Fundera's small business cybersecurity statistics, 43 percent of cyberattacks are targeted against small businesses. Small businesses are often attractive targets because they still have an abundance of sensitive data readily available, and they typically lack the...
Blog

Is MFT Dead?

As cybersecurity technology continues to advance, some might ask whether secure MFT is fading away as a viable option for organizations to use for their file transfer needs. If organizations do choose to utilize MFT for their secure file transfer purposes, they will certainly select the best MFT software they can. The bottom line is that MFT will not be going anywhere, and not anytime soon...
Blog

How Big Are Movie Files in 2022?

Gone are the simple days of moving pictures and practical effects. These days, movies are more sophisticated, with computer-generated special effects and high-resolution images. However, each addition to a film or episode adds to the file size, which can make both downloading for at-home viewing and the process of creating the project more complicated than ever before. While large movie files give...
Blog

File Transfer for Live Events

There are many organizations that require the ability to transfer large files fast , sometimes in the moment, to manage the requirements of live events. Fast media file transfer is important for many organizations and events: as they say, time is of the essence and live events are no exception. For organizations looking for a speedy solution to their live event needs, there is a solution that can...
Blog

The Surprising Relationship Between Data Privacy Laws and File Sharing

Location, location, location. Not just the mantra of realtors and would-be buyers – it’s also a concern for data security professionals world-wide. As cloud computing has ramped up across industries, the physical location of stored data has been called into question, alongside concerns stemming from data privacy laws. Read on to discover how data privacy acts are impacting file sharing. Data...
Blog

The 5 Biggest Cybersecurity Threats of 2022: How to Avoid Cybersecurity Attacks

Cybersecurity is one of the biggest issues of our time. Organizations are gradually investing more and more into c ybersecuri ty . Microsoft expects to be investing upwards of $1 billion a year on cybersecurity for the foreseeable future and they certainly won’t be the only organization to increase their spending. In 2019, organizations began considering cybersecurity as one of the biggest threats...