Resources

Blog

FIPS: How to Keep Your File Transfer Protocol Compliant

Image Any non-military agency handling sensitive but unclassified (SBU) data for the federal government must be compliant with Federal Information Processing Standards Federal Information Processing Standards (FIPS) This means that government agencies, contractors, and any IT solution hoping to obtain a federal contract must be FIPS...
Blog

Is FTPS HIPAA-Compliant?

Complying with stringent HIPAA requirements requires strong encryption protocols. GoAnywhere MFT utilizes FTPS, the more commonly used SFTP, and other protocols for secure file sharing.
Guide

Taking File Transfer Security to Another Level

As companies move to adopt zero trust architecture, securing files and the confidential information they contain is top of mind, especially as sharing data has never been easier. Read our white paper, which covers: How to secure sensitive files and streamline the file transfer process How to protect transferred files wherever they may travel Industry-specific challenges in...
Blog

The Encryption Prescription For Healthcare

  Image “Trust me, I’m a doctor.” The saying is overused, but there’s a ring of truth to it. We do trust doctors – with our health, the delivery of our babies, the care of our parents, and the diagnosis of our illnesses. And a lot of information in between. It’s no wonder then that this information – private, sensitive, vulnerable,...
Blog

How to Identify Cybersecurity Needs for File Transfers

  Image   Cybersecurity. The word or concept seems to arise at some point in nearly every news feed lately. Its prominence has risen over the past few years as the impact of inadequate cybersecurity and very determined cybercriminals is so substantial – whether you’re a small business or a large, sprawling enterprise.   Before we...
Blog

SOX Compliance: What You Need to Know

  Image   What is SOX or Sarbanes-Oxley Act?   SOX, or the Sarbanes-Oxley Act, was enacted by Congress in 2002 to help provide better security for the general public and consumers. It was structured to improve corporate governance and accountability and to better shield the public from malicious or unintentional misuse of...
Press Release

Scammers Access 50% of Compromised Accounts Within 12 Hours According to New Research

FOSTER CITY, Calif. and LONDON (June 8, 2021) — Fortra's Agari, the market share leader in phishing defense for the enterprise, unveiled today the results of an investigation into the anatomy of compromised email accounts. The threat intelligence brief, titled Anatomy of a Compromised Account, is the first research of its kind, showcasing how threat actors use credential...
Blog

How MFT Can Offset the Rising Cost of Data Breaches in 2022 

  Image There’s plenty to be concerned about when it comes to data breaches. At top of mind, there’s always the information that’s stolen, be it customer data, personal emails, confidential files, or any other number of company secrets that are supposed to remain within the company. Then there’s the monetary cost of the data breach –...
Case Study

Bristol Hospital Takes No Risks with Sensitive Data, Implements MFT

Industry: Healthcare Delivering the best possible experience for its patients is very important to Bristol Hospital. In addition to receiving excellent care, patients need to trust that the hospital is also protecting their health records and other sensitive data. GoAnywhere MFT from Fortra has allowed Bristol Hospital to ensure that trust with strong data encryption,...
On-Demand Webinar

Meeting Compliance Requirements with GoAnywhere

About the Webinar Many organizations have secure file transfer requirements. However, things can get complicated when it comes to securely transferring files – and meeting compliance requirements. If you have secure file transfer requirements between you and your customers and must meet certain regulations (now or in the future), this is the webinar for you! This live...
On-Demand Webinar

Meeting GDPR Compliance with GoAnywhere MFT

About the Webinar The EU General Data Protection Regulation (GDPR), new in 2018, meant that organizations worldwide needed to prepare for compliance — or face severe fines and penalties if regulation requirements weren’t achieved. Watch this webinar to boost your knowledge of the GDPR and discover how a secure file transfer solution like GoAnywhere MFT can help you achieve...
On-Demand Webinar

Is Your Remote Workforce a Top Security Risk?

Comfy clothes. No commute. Zoom meetings. File exchange security threats. One of these things does not belong in your remote workforce environment. The ever-increasing number of employees working remotely at least part of the workweek poses a top security threat to your organization, especially when sensitive files are being exchanged. If your organization does not currently...
On-Demand Webinar

How to Think Like a Hacker and Secure Your Data

About the Webinar There’s no denying it: data security incidents are increasing. Organizations try to keep up with the latest cybersecurity best practices and technology, but the more they collect, process, and share large volumes of sensitive information, the more chance they have of getting hit by a cyber threat. In response, most IT teams play defensive. They create data...
On-Demand Webinar

How to Prevent Data Breaches with GoAnywhere

About the Webinar It’s easy to feel frustrated when discussing data breaches and cybersecurity incidents. Organizations dedicate time and money annually to improve their security strategies, but hackers move forward too, creating new hacking methods that keep IT professionals on their toes. Staying two steps ahead of today’s cyber threats is hard. IT and security teams can...
On-Demand Webinar

How to Choose the Right Encryption Method for Securely Exchanging Files

Defense. That’s the strategy you and your IT team need to take against cybersecurity threats. Adding heft to your cybersecurity defense starts by taking proactive steps long before a data breach or misuse of your sensitive data occurs. Selecting the right encryption method for securing data transfers can help shield against incidents that can wreak havoc with your budget,...
On-Demand Webinar

HIPAA Data Security Best Practices

In a healthcare environment increasingly dependent on the sharing of electronic protected health information (PHI), covered entities (CEs) must adopt best practices for safeguarding against unauthorized access to sensitive patient data. As a baseline, healthcare organizations need to address HIPAA technical safeguards governing access to ePHI, audit controls for logging data...