Resources

Blog

Secure File Transfer for Supply Chain Risk Management

Supply chain attacks are one of the fastest-growing cyber risks that organizations face in 2022, and when it comes to supply chain risk management, organizations in every industry should pay attention. There have always been efforts to help organizations understand and mitigate risks related to supply chain, and recent initiatives, including the U.S.’s Executive Order on Improving the Nation’s...
Blog

Shadow IT and Work From Home: The Risks and Solutions

Working 9 to 5 is no longer the only way to make a living, and for the foreseeable future, organizations parking most of their employees at a particular desk Monday through Friday is looking less and less likely. Working from home, at least as part of a hybrid organizational structure, is here to stay. Whether working from home, in a hybrid situation, or back in that old familiar office chair...
Blog

Tainted Love, Ransomware, and More: This Month in Cybersecurity

February, while a short month, was long on cybersecurity threats. Read on for a few of the high- (well, low-lights) as well as for some resources from GoAnywhere MFT on how you can help secure your sensitive data files while they are in motion and in transit. Love Hurts The search for love turned up more than potential partners over the last few months (o.k., years). In fact, according to research...
Blog

How the Coronavirus Has Changed Data Security

COVID-19 Has Made a Lasting Impact on Data Security The Coronavirus pandemic has altered many things in this world and data security is no exception. Along with the solid impact COVID-19 has made on data security, let’s highlight some of the other key ways lasting change has been made within businesses. The Lasting Change: Working from Home As of 2022 , 16 percent of companies in the world are now...
Blog

Still WFH? Time to Revisit BYOD, Security, and More

Work from home, which was once an early-pandemic precaution, is becoming a norm across industries. It is likely that the pandemic has shifted how people work forever, with half of employees expecting to work predominantly from home or in a hybrid home-and-office system going forward. However, just as in the early days of the pandemic, cybersecurity while working from home is still a concern for IT...
Blog

What is Shadow IT and Why is it a Problem?

Shadow IT Doesn’t Lurk in the Shadows – it's Prevalent Although it may seem foreign now, there was once a time when an organization’s IT department had complete and total control over the technology being used by the organization. Before software could be purchased, or before anyone clicked download, the IT Director’s blessing was needed. In current times, no matter how hard your IT department may...
Blog

The 10 Biggest Data Security Breaches of 2021

2021 Was Not Fun for Those Who Suffered a Data Breach Although 2021 brought about many positive changes and more of a return to normalcy, it did not bring fun times for the many organizations who suffered from costly data breaches. With the numbers, costs, and impacts of a data breach on the rise, it’s important to do what you can to protect your sensitive data from a breach. The Cost of a Data...
Blog

What is Mobile Malware?

Meet Mobile Malware Mobile malware is a malicious kind of software that hackers use to specifically target and collapse operating systems on smartphones, tablets, and smartwatches in order to steal confidential data . Generally speaking , mobile devices aren’t as secure as computers. So, i t’s not a stretch that the same security measures organizations have in place for workstations and servers...
Blog

What is Encrypted File Sharing?

What is Encrypted File Sharing? Whether you’re sending data back and forth for edits or accessing a shared document, file security is important. Encrypted file sharing is a method of securely exchanging data either internally or externally by encoding data and protecting its transmission. Data encryption uses algorithms to scramble the contents of files so that they can’t be read without the...
Blog

What is SOC 2 and Why it Matters for Security

There are some things in life that should be a given: rollercoasters are inspected regularly, chefs wash their hands, and your organization’s file transfers are secure. That last is a little more nebulous to see immediate cause-and-effect (it’s not like your rollercoaster car rolling off the tracks or getting food poisoning!) but unsecure file transfers could put sensitive data at risk, impacting...
Blog

What is Zero Knowledge Encryption?

What is Zero Knowledge Encryption? If zero knowledge means every piece of information is absolutely confidential, and all data remains only with the user of a software or service, how does zero knowledge apply to encryption? Zero knowledge encryption basically states that data is kept secure via a unique user or encryption key, one that even the application developer does not know. You, and only...
Blog

What is the DROWN Attack?

What is the DROWN Attack? T he Decrypting RSA with Obsolete and Weakened eNcryption (DROWN) Attack is a serious vulnerability that affects HTTPS and other serv ers that rely on Secure Sockets Layer (SSL)/Transport Layer Security (TLS). Essentially DROWN is an attack vector that leverages a cross-protocol bug in servers that support modern TLS by taking advantage of their support for the insecure...
Blog

Developing a Plan for Data Risk Management

What is Data and Risk Management? Data and risk management encompasses the processes and procedures an organization follows to safeguard the data it collects and stores. Data is today’s biggest asset—and today’s biggest target. If your organization has data, no matter now little or how sensitive, it’s at risk for leakage, theft, or attack. Sorry, that’s a little melodramatic—but cybersecurity...
Blog

Diversity and Inclusion, Government Action, Organizational Risks: This Month in Cybersecurity

Each month we break down some of the bigger cybersecurity news and tips for organizations to stay in the know and make informed decisions around their cybersecurity plans. From diversity and inclusion to government movements to protect businesses and agencies from potential cybersecurity attacks, as well as the latest information about organizational weaknesses that U.S. organizations share, this...
Blog

Is MFT Dead?

As cybersecurity technology continues to advance, some might ask whether secure MFT is fading away as a viable option for organizations to use for their file transfer needs. If organizations do choose to utilize MFT for their secure file transfer purposes, they will certainly select the best MFT software they can. The bottom line is that MFT will not be going anywhere, and not anytime soon...
Blog

The 5 Biggest Cybersecurity Threats of 2022: How to Avoid Cybersecurity Attacks

Cybersecurity is one of the biggest issues of our time. Organizations are gradually investing more and more into c ybersecuri ty . Microsoft expects to be investing upwards of $1 billion a year on cybersecurity for the foreseeable future and they certainly won’t be the only organization to increase their spending. In 2019, organizations began considering cybersecurity as one of the biggest threats...
Blog

How Windows Works with GoAnywhere MFT

What is MFT? Managed file transfer, often shortened to MFT, is a category of software solutions that centralize and secure data movement. The majority of MFT solutions offer automation and encryption to simplify file transfers within organizations and to trading partners. Related Reading: What is MFT and How Does it Work? What is GoAnywhere? GoAnywhere is a leading MFT solution that goes above and...
Blog

What is the Data Security Lifecycle?

Heists of yore claimed stacks of cash, gold bars, or even dazzling jewelry as their prizes. Today, data is the motherlode for criminals. And rather than enormous vaults and security guards, organizations now employ data security software to keep their data protected. Digital data requires different types of protection than locks and keys. And unlike physical goods, data typically needs to move...
Blog

What Are the Current Cyber Threat Trends in 2021?

Many current cyber threat trends hinge on change and uncertainty caused by the COVID-19 pandemic. Whether it’s a panicked email recipient falling for a phishing scheme, innovations in ransomware, or simply remote workforces offering larger surfaces to attack, the goal of each is to find gaps in your company’s cyber security armor. Here are the old, new, and evolving trends to keep an eye on, and...
Blog

7 Scenarios in Which to Use Encryption Software

Not sure what encryption software is used for – or maybe just when to use each type? Discover common file transfer scenarios and which data encryption protocol best fits your needs. What is Data Encryption Software? Data encryption software, also called file encryption software , solutions come in various forms: free or paid, robust or lightweight, and each uses one of a handful of encryption...