Blog
PCI DSS 4.0 - What to Expect, What's Coming, How to Comply
By Heath Kath on Tue, 08/30/2022
Image
Get ready for more stringent PCI DSS compliance requirements. The PCI Security Standards Council (PCI SSC) updated its version 4.0 requirements in March 2022, in large part to address increasingly sophisticated cybercriminal threats. Rapidly growing contactless and cloud-based card usage also helped nudge an update to PCI DSS...
Case Study
Dayton Parts Automates Data Movement and Distribution with Managed File Transfer
Industry: Manufacturing
Dayton Parts knows that sending personalized price sheets to their valued customers on a regular basis is good business. This detailed personal attention continues to produce new and loyal customers. As the customer base grew, the amount of effort to create and distribute personalized price sheets began to affect productivity. Dayton Parts realized they...
Case Study
AnMed Health Improves File Transfer Stability and Enjoys Significant Cost Savings Thanks to MFT
Industry: Healthcare
As legacy FTP processes start to degrade, they slowly consume more and more IT resources. Most companies don't recognize the true enormity of the problem until it comes to a head.
AnMed Health (Anderson Area Medical Center) recognized the inefficiency and risk of their file transfer operations and set out to find a replacement: GoAnywhere MFT.
Reducing...
Blog
Are SSH and SFTP the Same?
By Heath Kath on Sun, 08/28/2022
Image
Are SSH and SFTP the Same?
SSH and SFTP are a classic pair. They intertwine when it comes to securing communication, and while they have similar capabilities, they are not the same thing. So, what’s the difference between them? Read on to find out.
What is SSH?
Secure Shell (SSH) is a transport layer that is used...
Case Study
Meliá Hotels International Gains File Transfer Stability and Confidence with GoAnywhere MFT
Adding GoAnywhere MFT to their IT environment for secure file transfers was the remedy Melia needed. GoAnywhere allowed Meliá Hotels International to integrate these third-party exchanges into the same tool as the rest of their transfers, without making any protocol changes, and with added security through its built-in SFTP and Secure Forms capabilities.
Case Study
Medical University of South Carolina
The Medical University of South Carolina (MUSC) is South Carolina's only comprehensive academic medical center.
We spoke with GoAnywhere customer Carl Gottlieb, Senior iSeries Analyst/Programmer at Medical University of South Carolina, while attending the 2014 COMMON Annual Meeting and Exposition.
...
Case Study
Monterey Mushrooms
For Monterey Mushrooms, the e-mail notifications, the ability to automate projects, and the seamless version updates are just a few of Barabara Bularzik's favorite features with GoAnywhere.
...
Blog
Security Risks of File Transfers and How to Reduce Them
By Heath Kath on Tue, 08/23/2022
Image
Transferring files between customers and trading partners, especially files containing sensitive data without appropriate data security protection solutions applied, involves at least some level of risk. You might accidentally send files to the wrong recipient. Or your latest email attachment was sent with an unsecure File...
Blog
How to Secure Your Data Exchanges
By Heath Kath on Mon, 08/15/2022
Image
Exchanging Data Securely Requires Stepped Up Data Transfer Methods
Exchanging data is easy, right? Just grab a file, attach it, and hit “send.” Then sit back and relax. Not so fast! If you want to securely exchange data and protect any sensitive data your files may contain, you need to send them with a secure file transfer...
Blog
5 Things You Should Know About Digital Rights Management (DRM)
Wed, 08/10/2022
Image
As the ongoing digital revolution continues to evolve the ways we do business, even the most standard practices of data security are no longer enough. “We're getting to the point where simply sending confidential information with basic encryption is no longer an acceptable method,” states Ian Thornton-Trump, CISO at Cyjax. While...
Blog
This Month in Cybersecurity: The Weather is Heating Up and So Are Cyberattacks
By Heath Kath on Thu, 08/04/2022
Image
At the time of writing, much of Europe and the U.S. is in the midst of a major heatwave, delivering record temperatures and concerns about climate change. Just as the heat is rising, so is the threat of cyberattacks.
New data has emerged that reveals 2022 is looking like it could be the worst year ever for cybersecurity in...
Blog
4 Ways You Can Use Your Digital Rights Management Tool
Tue, 08/02/2022
Image
In an increasingly collaborative work environment, it’s more important now than ever before that your organization has the highest level of visibility and control possible over its data. While knowing how to choose the right data security solutions such as managed file transfer, data classification, and more is a...
Blog
What Do Emerging Data Privacy Laws in the U.S. Mean for You?
By Heath Kath on Tue, 07/26/2022
Image
What is Data Privacy?
One can think of data privacy as all the processes involved in how confidential or personal information or data is collected, used, and shared or governed. No singular policy governs data privacy, with requirements and penalties varying across states and countries. Data privacy laws are legal constructs...
Blog
Largest Data Breaches in Last 10 Years
By Heath Kath on Tue, 07/19/2022
Image
Bigger is often better. A bigger slice of pizza or a bigger paycheck sounds pretty nice. An extra-large data breach, not so much.
Listing out the biggest data breaches of all time can be challenging, as the next big one could be right around the corner. At the time of this writing, reports are out that the Personally...
Blog
Lessons Learned from the REvil Ransomware Attack of 2021
By Scott Messick on Tue, 07/12/2022
Image
Fireworks lighting up the sky, the smell of backyard grills cranking out delicious food, and organizations reeling from massive global cyberattacks. Aaah….those not-so-sweet memories of that first weekend in July 2021, when hundreds of businesses were smacked with the financial, logistical, and reputational ramifications of...