Blog

Blog

The Encryption Prescription For Healthcare

“Trust me, I’m a doctor.” The saying is overused, but there’s a ring of truth to it. We do trust doctors – with our health, the delivery of our babies, the care of our parents, and the diagnosis of our illnesses. And a lot of information in between. It’s no wonder then that this information – private, sensitive, vulnerable, valuable – is protected by law. However, laws don’t always deter cyber...
Blog

How to Find a File Transfer Solution for Your Cybersecurity Needs

If your organization has already gone through an assessment or a reevaluation of your cybersecurity processes , policies, and tools, chances are you confirmed a need to ensure that the mission-critical and sensitive data you exchange every day must be secured both at rest and in transit. File transfer security is a key element of a comprehensive cybersecurity posture. The days of scripting...
Blog

Problems Secure File Transfer Solves in Financial Services

Nowhere is trust more important than in the financial services industry. People operate on trust when they invest their life savings in a bank account, build their 401K, take out a life insurance policy, transfer their stocks, or make an online payment. The transactions just work, and – we take for granted – the money is where it should be. But even that is built on a deeper web of trust. On the...
Blog

What Your Organization Needs to Know About Secure File Transfer

It’s safe to say that the last few years have significantly increased the demand for Secure File Transfer (SFT) solutions such as GoAnywhere MFT . When the pandemic made vast numbers of the working population work from home almost overnight, there was a sudden spike in the requirement for robust and effective SFT. People needed to share documents and other files when working from home, and they...
Blog

Secure Government Files with a Managed File Transfer Solution

If government IT departments were to debate on key cybersecurity issues, one that likely keeps people up at night is how to help ensure their sensitive, often top-secret, data is secure when being sent in and out of their network. While there may be several candidates in the running to address this cybersecurity issue, a leading solution contender would be secure managed file transfer, which can...
Blog

SOX Compliance: What You Need to Know

What is SOX or Sarbanes-Oxley Act? SOX, or the Sarbanes-Oxley Act, was enacted by Congress in 2002 to help provide better security for the general public and consumers. It was structured to improve corporate governance and accountability and to better shield the public from malicious or unintentional misuse of financial data. Remember those well-publicized and substantial financial scandals pre...
Blog

How MFT Can Offset the Rising Cost of Data Breaches in 2022 

There’s plenty to be concerned about when it comes to data breaches . At top of mind, there’s always the information that’s stolen, be it customer data, personal emails, confidential files, or any other number of company secrets that are supposed to remain within the company. Then there’s the monetary cost of the data breach – the amount of dollars your company must pay to repair the damage and...
Blog

How to Evaluate File Transfer Solutions

How to Choose a File Transfer Solution When it comes to software or technical solutions you’ve got options, sometimes too many of them. Thankfully, there are plenty of strategies to help you narrow down your choices and make an informed decision. You can ask an industry peer, read user reviews on any number of review sites, or request a demo or a free trial of one or more solutions. Any of these...
Blog

This Month in Cybersecurity: Has Cybersecurity Become the Greatest Concern for Global Business Leaders?

It can be easy for any organization to focus only on its own concerns and challenges. But irrespective of industry or location, one thing that unites businesses is the constant threat of a cyberattack and the damage it might cause. When sovereign wealth fund companies state cybersecurity is more of a concern than the market, or when Africa launches a new cross-continent cybersecurity center, it’s...
Blog

Security Solutions for Managed File Transfer

By Christopher R. Wilder Research Director & Senior Analyst, TAG Cyber Forbes Contributor Businesses are sharing more sensitive information every day. CISOs and CIOs face the challenge of securing data shared between employees, customers, and third parties. Managed file transfer (MFT) is the solution most organizations use to send and receive files and data in a way that ensures the information...
Blog

PCI DSS 4.0 - What to Expect, What's Coming, How to Comply

Get ready for more stringent PCI DSS compliance requirements. The PCI Security Standards Council (PCI SSC) updated its version 4.0 requirements in March 2022, in large part to address increasingly sophisticated cybercriminal threats. Rapidly growing contactless and cloud-based card usage also helped nudge an update to PCI DSS requirements, which were last updated in 2018 as version 3.2.1. The new...
Blog

Security Risks of File Transfers and How to Reduce Them

Transferring files between customers and trading partners, especially files containing sensitive data without appropriate data security protection solutions applied, involves at least some level of risk. You might accidentally send files to the wrong recipient. Or your latest email attachment was sent with an unsecure File Transfer Protocol (FTP) method. That email you just received from a trusted...
Blog

How to Secure Your Data Exchanges

Exchanging Data Securely Requires Stepped Up Data Transfer Methods Exchanging d ata is easy , right? Just grab a file, attach it , and hit “send.” Then si t back and r elax. Not so fast! If you want to securely exchange data and protect any sensitive data your files may contain, you need to send them with a secure file transfer solution that protects data at rest, in motion during the exchange...
Blog

What Do Emerging Data Privacy Laws in the U.S. Mean for You?

What is Data Privacy? One can think of data privacy as all the processes involved in how confidential or personal information or data is collected, used, and shared or governed. No singular policy governs data privacy, with requirements and penalties varying across states and countries. Data privacy laws are legal constructs that set clear lines around which data is considered sensitive, what...
Blog

Largest Data Breaches in Last 10 Years

Bigger is often better. A bigger slice of pizza or a bigger paycheck sounds pretty nice. An extra-large data breach, not so much. Listing out the biggest data breaches of all time can be challenging, as the next big one could be right around the corner. At the time of this writing, reports are out that the Personally Identifiable Information (PII) of 1 billion people in China may have been exposed...
Blog

Lessons Learned from the REvil Ransomware Attack of 2021

Fireworks lighting up the sky, the smell of backyard grills cranking out delicious food, and organizations reeling from massive global cyberattacks. Aaah….those not-so-sweet memories of that first weekend in July 2021, when hundreds of businesses were smacked with the financial, logistical, and reputational ramifications of ransomware attacks. While hardly shocking news anymore, the 2021...
Blog

This Month in Cybersecurity: Summer is Here, but There’s No Vacation From Cyberattacks

June generally marks the start of summer, although anyone thinking the cyber criminals will take a few months off should probably think again. Not only has one of most sacred of summer institutions – Wimbledon – been subject to a threat, but fresh attacks and threats emerged all over the world. It’s clear that organizations must remain vigilant and ready no matter the season. But what can be done...
Blog

What is the Smominru Botnet?

What is the Smominru Botnet? Though its origins date back to 2017, Smominru is a dangerous botnet that has been making headlines recently as it continues to spread, attacking targets in every industry. Smominru, which also operates under known variants like including Hexmen and Mykings, has infiltrated hundreds of thousands of machines, primarily attacking Windows servers. Smominru is not only...
Blog

End-to-End Rights Management Made Simple with SFT

Digital files are the crown jewels of any organization, and end-to-end rights management is increasingly the goal of businesses who need to transfer files securely. How can organizations ensure data is secure from inception to publication, especially when third parties enter the picture? Enter secure file transfer plus digital rights management. These two tools together help organizations keep a...
Blog

Is Your Disaster Recovery Site Ready?

The old adage, "It's not a matter of if, but when" can strike fear in the heart of every IT professional, especially when talking about recovering form the unexpected impact of outages. Whether the result of a natural disaster, cybercrime impact, or large-scale network outages that dreaded downtime and the security measures that need to be taken around it must be planned for. Most organizations...