Resources

Blog

I’ve Just Been Breached, Now What?

  Image So, you think (or perhaps you know) you’ve been breached. It’s every organization’s nightmare, and you’re living it, facing local and federal fines, upset customers, public panic, and a loss of intellectual property. A breach can be a harrowing ordeal; if you’re not sure what to do immediately after discovering the breach,...
Blog

How 3 Financial Institutions Solve File Transfer Needs with MFT Software

  Image On a scale of 1-10, how would you rate the efficiency of your file transfers right now? If you use manual scripts, legacy software, or a myriad of free tools to balance your encryption, automation, cybersecurity, reporting, and collaboration needs, it’s possible you’ll rate your efficiency low on the scale. After all,...
Blog

IT Pros in Healthcare: How to Choose a Secure File Transfer Solution

  Image Every healthcare provider wants to avoid being the next data breach headline—and unfortunately, we have seen many incidents and their consequences in 2018 so far. The causes of these data breaches range from wrongly configured databases to successful malware attacks and unauthorized user access. For those looking to avoid...
Blog

USPS Eliminates FTP, Requires Secure File Transfers

Early this year, the United States Postal Service (USPS) announced the elimination of FTP (File Transfer Protocol) from their business practices and policies—a change that strengthens the security of their data transmissions and addresses recent audit findings. What does this mean for you? The change is still in transition for now, but after August 31, 2017, mailers and...
Blog

10 Shocking PCI DSS Compliance Statistics

If you work for any organization that processes credit or debit card information, you’ve heard of the Payment Card Industry Data Security Standard (PCI DSS), the regulatory standard aimed at preventing costly data breaches like the ones you may have heard about at Home Depot or TJX. But how much do you really know about PCI DSS compliance? Here are some interesting PCI DSS...
Blog

Could Your FTP Server Pass a Compliance Audit?

  Image If an auditor showed up to your office tomorrow and wanted to examine your file transfer security policies and procedures for compliance, how confident are you that your organization would pass with flying colors? If there’s any doubt that your file exchange process can meet stringent compliance requirements, a secure...
Blog

FIPS 140-2 Plays Vital Government Business Role

  Image   What is FIPS 140-2? FIPS 140-2 is a standard with which cryptographic-based (encryption) security systems must comply when protecting sensitive data in U.S. government agencies and departments. This FIPS 140-2 standard also extends to other entities that may exchange sensitive data with the federal government, including...
Blog

How to Build a Framework for HIPAA and HITECH Compliance

  Image HIPAA, established in 1996, was signed into law to outline the appropriate ways to use and disclose patient health information. Read on to learn how to develop a HIPAA- and HITECH-compliant IT framework for your organization.   Why Does HITECH Exist? HITECH laws were enacted to up the ante on healthcare organizations to...
Blog

Addressing HIPAA and HITECH Compliance Challenges

  Image HIPAA and HITECH regulations were designed and enacted to increase the security surrounding personal health information from those who should not have access to it. Next to finance, the healthcare industry is one of the most regulated industries around. While debates on the cost, structure, and delivery of healthcare...
Press Release

GoAnywhere Adds FIPS 140-2 Validated Encryption Module

Omaha, Neb - May 22, 2012             Organizations can now secure their data transmissions using FIPS 140-2 validated encryption with the GoAnywhere managed file transfer solution from Linoma Software [now Fortra]. FIPS 140-2 is a critical compliance requirement for US federal government and state agencies, as well as for those companies that exchange sensitive data with the...