Resources

Blog

How to Streamline Secure Data Exchanges

  Image Secure Data Exchanges Don't Have to Sacrifice Efficiency Hitting “send” is as routine and frequent as sipping on coffee for many employees. And uploading a file to a third-party, vendor, or another colleague happens with that same automatic mind-set. Outside of the IT team, many employees don’t actually give a lot of thought...
Blog

Comparing the Top File Transfer Protocols

  Image With dozens of file transfer protocols to choose from, how do you know which is the best for your business? Some file transfer protocol specifications are set by trading partners – method, format, and security requirements – while others are set by internal requirements. Discover the top secure file transfer methods, and how...
Blog

HIPAA vs. HITRUST: The Key Differences

  Image   What is HIPAA?   HIPPA, or the Health Insurance Portability and Accountability Act, is a federal law that addresses regulatory compliance for healthcare organizations. HIPAA sets the standard for protecting sensitive patient data and applies to any company that deals with protected health information (PHI). HIPAA...
Press Release

GoAnywhere One of Two Gold Medal Winners for Fortra in the 2022 SoftwareReviews Managed File Transfer Data Quadrant Report

MINNEAPOLIS — April 13, 2022 — Fortra today announced that managed file transfer (MFT) solutions from GoAnywhere and Globalscape have been recognized as gold medalists in the 2022 Managed File Transfer – Enterprise Data Quadrant report from SoftwareReviews, a division of IT research and consulting firm Info-Tech Research Group. GoAnywhere MFT retained its spot as the market...
Press Release

Fortra Acquires Terranova Security to Aid Global Customers in Building Localized Employee Security Awareness Training

MINNEAPOLIS —April 8, 2022—Fortra announced today the acquisition of Terranova Security, a leader in global phishing simulation and security awareness training. Available in more than 40 languages, Terranova Security’s platform and content incorporates gamification techniques to increase engagement and knowledge retention. This approach enables all organizations to hone...
Blog

Choosing MFT Software Based on User Reviews

  Image Humans use reviews for pretty much everything – hiring a company, making a purchase, even applying for a job. Reviews give us insight into what someone – presumably someone like us, if they’re currently using the same thing we’re shopping for – thinks of a product: how they liked it, what their experience is, and what could...
Blog

Data Security Measures for the Return to Office

  Image Whether your employees are headed back to the office enthusiastically, with a bit of dread, or a mix of emotions, they’ll bring with them more than just their laptops, lunches, and stories from their work-from-home days upon their return. They’ll also potentially be bringing along some data security risks. While risks around...
Blog

5 Ways Government Can Improve Cybersecurity Resilience

  Image Cybersecurity for Government is Crucial In these trying times government agencies everywhere must be resilient when it comes to cybersecurity. Cyber resilience is an organization’s ability to prepare for, respond to, and recover from cyber threats. A cyber-resilient organization can adequately adapt to known and unknown...
Blog

What is India's Personal Data Protection Bill?

  Image The EU’s GDPR paved the way for data privacy and protection laws around the world, and one of the latest is the emerging Personal Data Protection Bill in India. While organizations in India already adhere to international data privacy laws, including GDPR when serving overseas customers, as well as the restrictions set out in...
Blog

Secure File Transfer for Supply Chain Risk Management

  Image Supply chain attacks are one of the fastest-growing cyber risks that organizations face in 2022, and when it comes to supply chain risk management, organizations in every industry should pay attention. There have always been efforts to help organizations understand and mitigate risks related to supply chain, and recent...
Blog

ModernCTO Podcast with Chris Spargen - Seamless Managed File Transfer

Chris Spargen, Senior Solutions Engineering Manager for HelpSystems (now Fortra), was recently featured on the ModernCTO Podcast. In the interview, Spargen discusses how MFT technology has rapidly evolved to be more user friendly and how the company’s MFT solutions can secure, automate, and encrypt file transfers in an ever-increasing threat environment. Listen below: ...
Blog

What Makes Audio and Music Files So Big?

If a tree falls in a forest, does it make a sound? Yes, but without the right tools to capture, process, and send the sound, no one will ever know. The same goes for any audio file: even with the right tools, it’s nearly impossible to capture, process, and send a sound with 100 percent accuracy. And even with the right tools, certain choices you make can sacrifice sound...
Blog

Shadow IT and Work From Home: The Risks and Solutions

  Image Working 9 to 5 is no longer the only way to make a living, and for the foreseeable future, organizations parking most of their employees at a particular desk Monday through Friday is looking less and less likely. Working from home, at least as part of a hybrid organizational structure, is here to stay. Whether working from...
Press Release

Fortra to Acquire Alert Logic to Enable Customers to Address Cybersecurity Skills Shortage with Hybrid IT Approach

MINNEAPOLIS March 9, 2022—Fortra announced today it has signed a merger agreement to acquire Alert Logic, a well-known leader in managed detection and response (MDR) services. Alert Logic works as a seamless extension of security teams, augmenting existing cybersecurity resources and technology to safeguard on-premise, cloud, SaaS, and hybrid infrastructures. The company’s MDR...
Blog

What is HITRUST Compliance?

  Image HITRUST Compliance Helps to Manage Risk The secure storage and transfer of sensitive data is of the utmost importance to the healthcare industry. Data security and complying with the Health Insurance Portability and Accountability Act (HIPAA) is paramount, yet doing so can often be complex and difficult to maintain. This is...
Blog

Tainted Love, Ransomware, and More: This Month in Cybersecurity

  Image February, while a short month, was long on cybersecurity threats. Read on for a few of the high- (well, low-lights) as well as for some resources from GoAnywhere MFT on how you can help secure your sensitive data files while they are in motion and in transit. Love Hurts The search for love turned up more than potential...
Blog

What is a PGP File?

  Image What is PGP and What is It Used For? PGP is short for Pretty Good Privacy and it’s one of the most widely used technologies for encrypting and authenticating files. It can help encrypt, decrypt, authenticate, and verity various file types including emails, files, directories, disk partitions, and more. PGP, along with its...
Blog

HTTPS vs. SFTP: The Key Differences

  Image   What Are the Key Differences Between HTTPS and SFTP?   HTTPS and SFTP are both important protocols used for the act of sending data. However, there are innate differences between them. Read more for a look at the key differences between HTTPS and SFTP. What is HTTPS? HTTPS, or Hypertext Transfer Protocol Secure, is a...
Blog

Cybersecurity Concerns in Healthcare in 2022

  Image Every year the healthcare industry is greeted with headlines stating that ‘last year was the most-breached ever.’ And that trend is unlikely to stop in 2022. The healthcare industry has historically been one of the most-targeted by hackers, and one of the most breached by internal actors. Key reasons why include vast amounts...
Blog

Fast File Transfer Terms You Should Know

When looking for an accelerated file transfer solution, you may run into an alphabet soup of acronyms and abbreviations. We’re here to help you on your quest to find the fastest file transfer solution for your business needs by clarifying what these many terms mean, and why you should care about them. First, what exactly is fast file transfer, and how much faster is it than...