Resources

Blog

Revoke Access to Your Files from Anywhere – Digital Rights Management (DRM) and How it Works

Your auditor sends a copy of your company’s recent financial statements to his firm to verify another clean pass. Because he’s worked there for years, he sends the file to his partner without encrypting it and leaves for the day. On his way home, his phone buzzes as an email notification comes in with the subject “Wrong Jeff?” Almost immediately, your company’s sensitive financial data...
Datasheet

GDPR Compliance Specs

General Data Protection Regulation The General Data Protection Regulation (GDPR) is a regulation approved by the European Parliament. It applies to all organizations that handle and process EU citizens’ data, regardless of whether they’re located in the European Union or not. Failure to meet GDPR requirements can result in huge penalties: 4% of annual global turnover (revenue) or €20 million...
Datasheet

PCI DSS Compliance Specs

SECURITY SETTINGS AUDIT REPORT PCI DSS applies to every organization around the world that processes credit or debit card information. Failing a PCI DSS audit can result in fines, but IT’s responsibilities extend beyond avoiding these penalties. Meeting PCI standards contributes to the security of your business by helping to avoid data breaches and all of their related costs: litigation, customer...
Blog

What Do Emerging Data Privacy Laws in the U.S. Mean for You?

What is Data Privacy? One can think of data privacy as all the processes involved in how confidential or personal information or data is collected, used, and shared or governed. No singular policy governs data privacy, with requirements and penalties varying across states and countries. Data privacy laws are legal constructs that set clear lines around which data is considered sensitive, what...
Blog

Secure File Sharing for Banks Gets a Boost from GoAnywhere MFT

Secure file sharing for banks has always been of utmost importance and is only gaining traction in the face of common cybersecurity threats and compliance requirements alike. Requirements like PCI DSS, GDPR, GLBA, and more can make processes more complicated, even as the safeguards outlined within them promote data security to protect both businesses and their clients in the face of cyber threats...
Blog

Why it’s Time to Adopt Zero Trust Architecture

If you work in cybersecurity, the chances are that you will have come across the phrase Zero Trust over the past few years. It’s become a real industry buzzword, but there is substance behind the noise on this occasion. To the outsider, it’s a term that is easy to misinterpret. It sounds draconian and severe and could be perceived as meaning the organization trusts no one when it comes to...
Blog

End-to-End Rights Management Made Simple with SFT

Digital files are the crown jewels of any organization, and end-to-end rights management is increasingly the goal of businesses who need to transfer files securely. How can organizations ensure data is secure from inception to publication, especially when third parties enter the picture? Enter secure file transfer plus digital rights management. These two tools together help organizations keep a...
Blog

Secure File Transfer Drives Compliance and Efficiency for Credit Unions

The unwavering protection of personally identifiable information (PII) is the foundation upon which financial and banking organizations build their services and instill trust in customers. Achieving this requires credit unions and related companies to navigate a fine balance between stringent data security and business efficiency to meet customer needs and evolving compliance requirements...
Blog

Comparing the Top File Transfer Protocols

With dozens of file transfer protocols to choose from, how do you know which is the best for your business? Some file transfer protocol specifications are set by trading partners – method, format, and security requirements – while others are set by internal requirements. Discover the top secure file transfer methods, and how they stack up against one another in this blog. Your Comprehensive File...
Blog

HIPAA vs. HITRUST: The Key Differences

What is HIPAA? HIPPA, or the Health Insurance Portability and Accountability Act, is a federal law that addresses regulatory compliance for healthcare organizations. HIPAA sets the standard for protecting sensitive patient data and applies to any company that deals with protected health information (PHI). HIPAA requires healthcare organizations and their business associates to implement...
Blog

What is India's Personal Data Protection Bill?

The EU’s GDPR paved the way for data privacy and protection laws around the world, and one of the latest is the emerging Personal Data Protection Bill in India. While organizations in India already adhere to international data privacy laws, including GDPR when serving overseas customers, as well as the restrictions set out in 2000’s Information Technology Act , neither directly and specifically...
Blog

Secure File Transfer for Supply Chain Risk Management

Supply chain attacks are one of the fastest-growing cyber risks that organizations face in 2022, and when it comes to supply chain risk management, organizations in every industry should pay attention. There have always been efforts to help organizations understand and mitigate risks related to supply chain, and recent initiatives, including the U.S.’s Executive Order on Improving the Nation’s...
Press Release

Fortra to Acquire Alert Logic to Enable Customers to Address Cybersecurity Skills Shortage with Hybrid IT Approach

MINNEAPOLIS March 9, 2022—Fortra announced today it has signed a merger agreement to acquire Alert Logic, a well-known leader in managed detection and response (MDR) services. Alert Logic works as a seamless extension of security teams, augmenting existing cybersecurity resources and technology to safeguard on-premise, cloud, SaaS, and hybrid infrastructures. The company’s MDR solution focuses on...
Blog

What is HITRUST Compliance?

HITRUST Compliance Helps to Manage Risk The secure storage and transfer of sensitive data is of the utmost importance to the healthcare industry. Data security and complying with the Health Insurance Portability and Accountability Act (HIPAA) is paramount, yet doing so can often be complex and difficult to maintain. This is where HITRUST comes in as a certifiable and recommended framework trusted...
Blog

What is a PGP File?

What is PGP and What is It Used For? PGP is short for Pretty Good Privacy and it’s one of the most widely used technologies for encrypting and authenticating files. It can help encrypt, decrypt, authenticate, and verity various file types including emails, files, directories, disk partitions, and more. PGP, along with its offshoots Open PGP and GPG , are used so frequently because they’re flexible...
Blog

Cybersecurity Concerns in Healthcare in 2022

Every year the healthcare industry is greeted with headlines stating that ‘last year was the most-breached ever .’ And that trend is unlikely to stop in 2022. The healthcare industry has historically been one of the most-targeted by hackers, and one of the most breached by internal actors. Key reasons why include vast amounts of extra sensitive patient data, higher-than-average payouts, and a slow...
Blog

13 Essential MFT Blog Posts You Might Have Missed

There’s a lot out there (and just on this website) about what MFT (managed file transfer) software is , why it’s a good FTP alternative, and how to choose the best file transfer software for your business. That’s why we’ve selected 13 of our top blogs that answer those exactly those questions – and more. And because questions about any software solution typically depend on how – or if – you’re...
Blog

Still WFH? Time to Revisit BYOD, Security, and More

Work from home, which was once an early-pandemic precaution, is becoming a norm across industries. It is likely that the pandemic has shifted how people work forever, with half of employees expecting to work predominantly from home or in a hybrid home-and-office system going forward. However, just as in the early days of the pandemic, cybersecurity while working from home is still a concern for IT...
Blog

Looking to 2022: New Year, New Data Security Strategies

3 Data Centric Security Strategies for 2022 Despite massive growth in data security spending, the number of data breaches is increasing. With constant changes in how and where work is done—thanks in part to growth in both cloud computing and mobile device usage—the threats are changing, too. And so are the strategies taken to mitigate those threats. It’s time to consider whether the safeguards and...