On-Demand Webinar
How to Prevent Data Breaches with GoAnywhere
Tue, 09/06/2022
About the Webinar
It’s easy to feel frustrated when discussing data breaches and cybersecurity incidents. Organizations dedicate time and money annually to improve their security strategies, but hackers move forward too, creating new hacking methods that keep IT professionals on their toes.
Staying two steps ahead of today’s cyber threats is hard. IT and security teams can...
On-Demand Webinar
GoDrive File Sync & Sharing
Fri, 09/02/2022
GoDrive is your Enterprise File Sync and Sharing solution. All of your users' documents, images, videos, and sensitive files are stored on your network and automatically sync to each of your users' connected devices, allowing them to safely access files from anywhere.
Users can access GoDrive from the secure HTTPS web client, through the desktop GoDrive sync client for Mac and...
On-Demand Webinar
Get the Most Out of GoAnywhere: Achieving Cloud File Transfers and Integrations
Fri, 09/02/2022
About the Webinar
From achieving easy trading partner connections to saving time and money on energy costs, hardware upgrades, unexpected downtime, and more, moving a portion of your file transfer processes to a cloud environment can improve your organization in surprising ways. The cloud offers much to those who consider it — and so does a GoAnywhere MFT cloud deployment.
If...
On-Demand Webinar
FTP, FTPS, & SFTP: Which Protocol Should You Use and When?
Thu, 09/01/2022
FTP, FTPS, and SFTP are three of the key protocols for transferring files, but do you know which one is the best way to secure your organization’s sensitive data during the transfer process?
Our webinar is here to help you learn the differences between the protocols, how to determine which is the most optimal for your organization, and more.
Join Chris Spargen, Sr. Manager of...
On-Demand Webinar
How to Centralize and Secure File Transfers Organization-Wide
Wed, 08/31/2022
Costly data breaches can occur when individuals and departments use file sharing applications that aren’t centralized or secure and they don’t recognize the risks these actions pose. MFT can deliver a more secure, centralized file transfer process if your organization faces the following:
During this session, our presenter Scott Messick will feature these integrations and how...
On-Demand Webinar
Combating Modern Threats: How to Avoid Making Your Business an Easy Target
Wed, 08/31/2022
...
On-Demand Webinar
Are You Avoiding These Top 10 File Transfer Risks?
Wed, 08/31/2022
About the Webinar
You know what good cybersecurity practices look like; maybe you even set them up in your organization. Files are encrypted in transit, workstations and servers are protected with strong password policies, firewalls and blacklists secure the internal network from intruders, and employees are well versed in what a phishing attack looks like.
Everything is...
On-Demand Webinar
10 Ways to Make File Transfers Easier, Automated and Secure
Wed, 08/31/2022
Thank you for your interest in this on-demand webinar.
Selecting a Managed File Transfer solution for your organization is an important step toward simplifying and securing your mission critical file transfers. There are, however, some important considerations when researching the best MFT solution.
Watch this webinar recording to hear Chief Architect Bob Luebbe explain how...
Blog
Are SSH and SFTP the Same?
By Heath Kath on Sun, 08/28/2022
Image
Are SSH and SFTP the Same?
SSH and SFTP are a classic pair. They intertwine when it comes to securing communication, and while they have similar capabilities, they are not the same thing. So, what’s the difference between them? Read on to find out.
What is SSH?
Secure Shell (SSH) is a transport layer that is used...
Blog
This Month in Cybersecurity: The Weather is Heating Up and So Are Cyberattacks
By Heath Kath on Thu, 08/04/2022
Image
At the time of writing, much of Europe and the U.S. is in the midst of a major heatwave, delivering record temperatures and concerns about climate change. Just as the heat is rising, so is the threat of cyberattacks.
New data has emerged that reveals 2022 is looking like it could be the worst year ever for cybersecurity in...
Blog
4 Ways You Can Use Your Digital Rights Management Tool
Tue, 08/02/2022
Image
In an increasingly collaborative work environment, it’s more important now than ever before that your organization has the highest level of visibility and control possible over its data. While knowing how to choose the right data security solutions such as managed file transfer, data classification, and more is a...
Blog
Largest Data Breaches in Last 10 Years
By Heath Kath on Tue, 07/19/2022
Image
Bigger is often better. A bigger slice of pizza or a bigger paycheck sounds pretty nice. An extra-large data breach, not so much.
Listing out the biggest data breaches of all time can be challenging, as the next big one could be right around the corner. At the time of this writing, reports are out that the Personally...
Blog
Lessons Learned from the REvil Ransomware Attack of 2021
By Scott Messick on Tue, 07/12/2022
Image
Fireworks lighting up the sky, the smell of backyard grills cranking out delicious food, and organizations reeling from massive global cyberattacks. Aaah….those not-so-sweet memories of that first weekend in July 2021, when hundreds of businesses were smacked with the financial, logistical, and reputational ramifications of...
Blog
This Month in Cybersecurity: Summer is Here, but There’s No Vacation From Cyberattacks
By Heath Kath on Thu, 07/07/2022
Image
June generally marks the start of summer, although anyone thinking the cyber criminals will take a few months off should probably think again. Not only has one of most sacred of summer institutions – Wimbledon – been subject to a threat, but fresh attacks and threats emerged all over the world.
It’s clear that organizations...
Blog
What is the Smominru Botnet?
Thu, 06/30/2022
Image
What is the Smominru Botnet?
Though its origins date back to 2017, Smominru is a dangerous botnet that has been making headlines recently as it continues to spread, attacking targets in every industry. Smominru, which also operates under known variants like including Hexmen and Mykings, has infiltrated hundreds of thousands...
Blog
Secure File Sharing for Banks Gets a Boost from GoAnywhere MFT
By Chris Spargen on Thu, 06/23/2022
Image
Secure file sharing for banks has always been of utmost importance and is only gaining traction in the face of common cybersecurity threats and compliance requirements alike.
Requirements like PCI DSS, GDPR, GLBA, and more can make processes more complicated, even as the safeguards outlined within them promote data security to...
Blog
What is Ransomware and How to Detect and Prevent It
By Heath Kath on Tue, 06/21/2022
Image
What is Ransomware?
Let’s start with the basics. The simple definition of ransom is “a consideration paid or demanded for the release of someone or something from captivity.” Ransomware, then, is a way for bad actors to encrypt information and hold it ransom in exchange for money—typically untraceable bitcoin.
There are...
Blog
Why it’s Time to Adopt Zero Trust Architecture
By Scott Messick on Tue, 06/14/2022
Image
If you work in cybersecurity, the chances are that you will have come across the phrase Zero Trust over the past few years. It’s become a real industry buzzword, but there is substance behind the noise on this occasion.
To the outsider, it’s a term that is easy to misinterpret. It sounds draconian and severe and could...