Blog
7 Scenarios in Which to Use Encryption Software
By Heath Kath on Thu, 08/26/2021
Not sure what encryption software is used for – or maybe just when to use each type? Discover common file transfer scenarios and which data encryption protocol best fits your needs.
What is Data Encryption Software?
Data encryption software, also called file encryption software, solutions come in various forms: free or paid, robust or...
Blog
What is PGP Encryption and How to Use It
By Chris Spargen on Tue, 08/03/2021
Encryption is key to securing organizational data in the short term and long. However, there are a few different types of encryption that organizations can use to achieve the optimal level of security. GnuPG is one of the most notable. However, today we’ll break down how PGP encryption works and how to use it to maintain the safety of your files.
...
Blog
PGP vs. Open PGP: What’s the Difference?
By Chris Spargen on Tue, 05/04/2021
Encryption standards become more and more important every day. With the rise of data breaches, it’s critical now more than ever for organizations to raise the level at which they protect their information. Partly, educating employees has presented itself as an easy way to make data safer. However, taking the time to choose the right method of...
Blog
Should You Use PGP or GPG Encryption?
By Heath Kath on Thu, 04/01/2021
Not every piece of information is meant for every pair of eyes. That’s why organizations count on encryption technology – to lock down their sensitive data from malicious acquisition or even human error. And, when it comes to those encryption protocols, you’ve got options. One choice you or your IT team might need to make is whether to use PGP or GPG...
Blog
What is GPG?
By Heath Kath on Tue, 02/23/2021
What is GPG?
GPG, also known as GNU Privacy Guard (GnuPG), is a different adaption, but popular implementation of the Open PGP standard as defined by RFC 4880.
GPG in Depth
GPG is an open-source standard and strong alternative to the official PGP software owned by Symantec. It was developed by Werner Koch and released in 1999 as an alternative to...
Blog
Why You Should Use File Encryption Software
By Heath Kath on Thu, 08/27/2020
File Encryption Software is “Key”
What is the key to keeping your data safe? One word: Encryption. There’s no question that encrypting sensitive data at rest and in motion is essential when it comes to guarding against cyber threats and complying with local, national, or industry-standard requirements.
However, if you’re still on the fence...
Blog
How Encryption Works: Everything You Need to Know
By Heath Kath on Thu, 05/14/2020
What is Data Encryption?
Encryption is a method of encoding data (messages or files) so that only authorized parties can read or access that data. Encryption software uses complex algorithms to scramble the data being sent. Once received, the data can be decrypted using a key provided by the originator of the message. The effectiveness of...
Blog
Open PGP and GoAnywhere MFT: What You Need to Know
By Heath Kath on Fri, 10/04/2019
Which Solution is Right for You? Open PGP vs. GoAnywhere MFT
If you have sensitive files that need to get from point A to Point B securely, you may have considered utilizing Open PGP or a managed file transfer solution, like GoAnywhere MFT. Do you know which option is the best fit for your organization?
What is Open PGP?
Open PGP is an...
Blog
5 Benefits of PGP Decryption Using Managed File Transfer
By Heath Kath on Fri, 05/24/2019
If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want it to include a key...
Blog
How to Encrypt Files in Linux
By Heath Kath on Thu, 05/16/2019
If your organization uses Linux operating systems to run key business processes, it’s important to implement tried-and-tested Linux security practices that support critical files as they transfer from one system to another. One requirement that pops up frequently for Linux users is file encryption. Linux files need to be encrypted seamlessly and...
Blog
How to Solve 4 Common Email Security Challenges
By Brian Pick on Mon, 10/29/2012
Yes. Emailing someone is still one of the easiest ways to share data. However, there are some important caveats to sharing files this way that can put your organization’s file transfers at risk.
Email File Transfer Challenges
These are the four big challenges that organizations should be aware of when transmitting files via email.
Email is sent ...
Blog
Meeting Compliance Regulations and Privacy Laws for Sensitive Data Transfers
By Brian Pick on Mon, 01/10/2011
Comply with Data Security Requirements
Highly sensitive data is exchanged between organizations on a constant basis making data security compliance more vital than ever to keep communication flowing.
For instance, if a business routinely transmits financial information to their bank including payroll direct deposits and ACH payments, these...