Resources

Article

10 Ways GoAnywhere MFT can Improve Your Efficiency on the IBM i

Image Are you using homegrown processes in your organization to send files on the IBM i? Between the knowledge required to write and maintain file transfer scripts, the time spent on creating user profiles for every file recipient, and the hassle of solving connection problems so data is always delivered successfully, manual IBM i...
Blog

WinSCP Free SFTP Client or an MFT SFTP Client?

  Image If you’re looking for a SFTP client to use for your organization’s file transfers, it might be tempting to go with one that’s free—and bonus points if it’s open source. Often enough, these SFTP clients meet the minimum requirements for most network administrators, they’re easy to install (without taking up much space on your...
Blog

EFSS vs. MFT: What's the Difference?

  Image EFSS (Enterprise File Sync and Share) and MFT (Managed File Transfer) are two terms that are frequently thrown around in the IT industry. Each solution is used to transfer files to multiple locations and devices, and they can both be deployed on-premises or in a cloud environment. These similarities inspire frequent...
Blog

5 Cloud Security Best Practices for Microsoft Azure

  Image Migrating company data to the cloud is often a primary goal for modern organizations. In fact, by 2018, 60% of organizations’ IT infrastructure will be cloud-based, according to IDG’s Enterprise Cloud Computing Survey. Cloud infrastructure comes with many benefits, including—but not limited to—reducing IT budgets, improved...
Blog

5 Best Practices for IBM i File Transfers

  Image Using IBM’s built-in FTP and Open SSH servers to transfer files to and from your IBM i systems can be time-consuming, if not simply riddled with fine details. From scripting knowledge to running specific (and sometimes obscure) commands, there’s a lot to consider—and the safety and integrity of your files is probably at the...
Blog

What to Consider When Selecting Managed File Transfer Software

  Image You’re at work, at least five programs open on your computer as you tweak the custom Linux shell and Python scripts that allow you to transfer dozens of company files from one destination to another. Commands pour from your fingers as you check the transfers for successful delivery. Some of them failed; you troubleshoot why,...
Blog

Are Your Electronic Health Records (EHRs) Secure?

  Image Since moving to Electronic Health Records and modern EHR technology, the healthcare industry has taken great strides to enhance patient care, internal workflows, and business-to-business communication. These improvements bring organizations closer and closer to full integration with others in the industry; a goal that will,...
Blog

30 Ways to Simplify Life with Advanced Workflows

  Image Are you using GoAnywhere’s Advanced Workflows yet? If not, you’re missing out. What are Workflows? Workflows are projects you can create in GoAnywhere MFT to define your file transfers and improve your business processes. Each project is able to contain multiple tasks that execute in a seamless end-to-end workflow. Pretty...
Blog

Two Cybersecurity Takeaways from the Equifax Data Breach

  Image It’s been nearly a week since Equifax went public with knowledge of a massive data breach—perhaps one of the biggest to date. There’s no word yet on who is or isn’t affected, but it’s very likely that 143 million Americans (45% of the U.S. population and 80% of those who have a credit report) are now at risk of identity theft...
Blog

Understanding the GDPR (General Data Protection Regulation)

Image Note from the Editor: This is an older resource on GDPR. For more on the latest GDPR resources, check out our GDPR resource page. Table of Contents Introduction What is the GDPR? GDPR and the Data Protection Directive 2018: The Year of GDPR GDPR and Brexit GDPR Fines and Penalties How to...
Blog

How Often Should You Change Your Password?

  Image “Your password will expire in X days.” That pop-up or email is all-too-familiar for employees at organizations requiring login credentials with the common “90- or 45-day rule” for changing or updating passwords. It’s a security best practice designed to help keep your accounts—and your organization—secure from hackers and...
Blog

7 Cloud Security Best Practices for Amazon Web Services

  Image Temporary and permanent storage of data in the cloud has grown in popularity over the years. Companies like Land O’Lakes and Boeing moved their information to the cloud last year to simplify the technology they used. Video-streaming behemoth Netflix finished their journey to the cloud in early 2016 after seven years of moving...
Blog

Why You Should Implement a Third Party Vendor Assessment Program

  Image Third party vendors are incredibly useful. They allow businesses to automate certain processes they can’t do themselves, like implement payroll services to compensate employees, and bridge gaps in their technology. But while the money, time, and brainpower freed up by outsourcing tasks is a huge positive, third party vendors...
Blog

10 Easy Ways to Protect Your Data at Work

In a recent survey of UK workers, over half the employees who participated across 1,000 organizations admitted that they open suspicious email attachments. More than 80% also said they open strange attachments if the sender appears to be someone they know, and “one in five said the business they work for has no policy on how to handle email attachments, or they have not been...
Blog

USPS Eliminates FTP, Requires Secure File Transfers

Early this year, the United States Postal Service (USPS) announced the elimination of FTP (File Transfer Protocol) from their business practices and policies—a change that strengthens the security of their data transmissions and addresses recent audit findings. What does this mean for you? The change is still in transition for now, but after August 31, 2017, mailers and...
Blog

What is MFT and How Does It Work?

Compared to using a variety of standalone FTP and SFTP tools and scripts, managed file transfer (MFT) technology allows professionals to streamline how data is transferred. MFT helps organizations send and receive files in the cloud and across their private networks, create and control workflows, automate business processes, and centralize management from a single system. ...
Blog

7 Steps to Protect Yourself Against Corporate Spear Phishing

Anyone with an email account is used to spam. It happens one day: you get that first unsolicited email, and then a flood of ads, flash sale offers, and foreign bank transaction requests rushes into your inbox. In that moment, the battle for your virtual sanity begins. But while spam emails are mostly harmless—you tend to see them from a mile away and respond accordingly...
Blog

8 Ways to Protect Your Healthcare Organization from a Data Breach

In 2020, there were 642 data breaches of healthcare organizations. That’s a new record, up 25 percent from the previous year. In these breaches, the records of millions of Americans were exposed. These incidents occurred at all types of organizations in the industry, including clinics, insurance providers and their health system business associates.   If you’re in the...
Blog

A Reflection on NAB: Media Industry Trends, Challenges and How the Industry is Responding

Image After getting back from the NAB show this year, I have been thinking about some of the media industry trends that present changes, as well as the opportunities. The industry as a whole has been in a state of change: the content itself is rapidly becoming larger, workflows are changing and becoming more dispersed, the way we...