Resources

Blog

How GoAnywhere MFT Maximizes File Transfers for the Retail Industry

    GoAnywhere MFT Secures Customer Data for the Retail Industry   Protecting customer data integrity is crucial for the retail industry. Data breaches are no joke, especially when a company’s reputation is on the line. There really is no room for error when highly sensitive credit card data and other personal information could be compromised by...
Blog

Avoid a PCI Breach; Avoid Costly Consequences

  Trending and making news headlines can be great for business, but not if the reason you’re making news is because of a PCI breach. Any organization that processes credit or debit card information is vulnerable, but any organization can also take steps to minimize their risks and the costly mitigation efforts that follow a breach. The Payment Card...
Blog

What is Health Level Seven (HL7)?

    What is HL7?   HL7, short for Health Level Seven, is a set of international Electronic Data Interchange (EDI) standards used to provide guidance with the transfer and sharing of clinical and administrative data between software applications used by various healthcare providers. These standards focus on the Application Layer, or “layer 7” in the...
Blog

Can HIPAA-Certified Solutions Really Guarantee Compliance?

  When searching for a new software solution to meet your organization’s needs, it’s easy to see the labels “HIPAA-Certified” or “HIPAA Compliant” and believe your bases are covered. After all, “HIPAA-Certified” means the product or application follows HIPAA’s privacy rules and has everything in place to protect your health and patient information,...
Blog

What is PeSIT?

  What is PeSIT? PeSIT, short for Protocol d'Echanges pour un Systeme Interbancaire de Telecompensation (Protocol for data Exchange within the French Systems for Interbank Tele-clearance), is an end-to-end open-source file transfer protocol that was developed in 1986 by the French Interbank Teleclearing Systems Economic Interest Grouping (GSIT). The...
Blog

What is GPG?

  What is GPG? GPG, also known as GNU Privacy Guard (GnuPG), is a different adaption, but popular implementation of the Open PGP standard as defined by RFC 4880. GPG in Depth GPG is an open-source standard and strong alternative to the official PGP software owned by Symantec. It was developed by Werner Koch and released in 1999 as an alternative to...
Blog

Encryption for Exchanging Files

  You seal the envelope when you send a letter. You lock your car when you park at the big box store. You track your packages to make sure porch pirates don’t get them before you do. Your file exchanges should be no different. Learn the essentials on how you can keep your data secure both while it’s sitting at home or being delivered. What is...
Blog

What is Safer Internet Day?

    Safety First: It’s Safer Internet Day!   Each February, more than 100 countries around the world take note of the massive power of the internet and more importantly, the urgency surrounding how to be safer and better users of the internet, especially those younger users. In the U.S., Safer Internet Day is recognized on Feb. 9. Why Was Safer...
Blog

What is FISMA?

  What is FISMA and How Does it Work? The Federal Information Security Management Act (FISMA) is a 2002 United States law that outlines steps and guidelines to follow to reduce security risks to federal data. FISMA applies to all U.S. federal agencies, some state agencies, and any private sector organizations that have a contract with the U.S. government. Additionally, both the National...
Blog

The 5 Biggest PCI Compliance Breaches

  The Payment Card Industry Data Security Standard (PCI DSS) is the main information security standard for organizations that process credit or debit card information must abide by. The guidelines established in PCI DSS cover how to secure data handling processes. While most organizations work to avoid PCI compliance breaches through the requirement’s...
Blog

PCI Statistics That May Shock You

    If your organization processes credit or debit card information, you’re probably already familiar with the Payment Card Industry Data Security Standard (PCI DSS), the regulatory standard enacted to prevent large data breaches like the ones you hear about frequently – the ones that make headlines for all the wrong reasons.   Here are a few PCI...
Blog

How to Comply with Brazil's Lei Geral de Proteção de Dados (LGPD)

  What is Brazil’s LGPD? LGPD stands for Lei Geral de Proteção de Dados (General Data Protection Law), which is a law streamlining what was previously 40 separate statutes protecting personal data in Brazil. Academic research and legislation around personal data and privacy has been an active priority in Brazil, culminating in the overarching idea...
Blog

What is SSL, TLS, and HTTPS?

    Meet the Trio   SSL, TLS, and HTTPS are a unique trio that each work to help keep your important data secure on the Internet. If you've ever wondered how each of these protocols compares, you’ve come to the right place. Here are the basics and how they operate. Know the Terms: GoAnywhere Glossary   What is SSL? SSL, short for Secure Sockets...
Blog

Top Data Breaches of 2020: How You Can Minimize Your Risks

  Despite the many changes that 2020 brought, including new home offices, new (and quickly abandoned) hobbies, and new threats, some things stayed the same: numerous data breaches, disruptive hacks, and staggering fines. We thought 2019 was a momentous year for data breaches, and it even earned the name “the worst year on record” before the end of...
Blog

The Top 7 Cybersecurity Strategies for Your Business in 2021

  Did you know that the average cost of a data breach is $3.92 million and almost 30% of all organizations will experience at least one breach over the next 24 months? Besides the immediate cost, such as data loss and regulatory fines, organizations also suffer from tarnished reputations, eroded customer trust, the cost of other remedial measures, and...
Blog

What is the Digital Charter Implementation Act?

    Introducing the Digital Charter Implementation Act, 2020   In November 2020, one of the biggest shakeups in the history of Canada’s privacy law, the Digital Charter Implementation Act (DCIA), was proposed and is currently on the horizon. The DCIA is composed of two separate Acts: The Consumer Privacy Protection Act (CPPA) and the Personal...
Blog

What is Cryptojacking?

    Cryptocurrency and Cryptojacking Make a Dangerous Pair   With the rise in popularity of cryptocurrencies (electronic money) and their increasing acceptance as a legitimate way to purchase goods and services online, it didn’t take long for cryptojackers or cryptohackers to begin devising their schemes to mine cryptocurrency from others; and it’s...
Blog

The State of Financial Services Cybersecurity

  From Robin Hood to Bonnie and Clyde to Equifax, banks and the finance industry have been in jeopardy since the beginning of recorded history. For one, banks and financial services are enticing targets. The promise of a big payout, whether by breaching the vault or ransoming sensitive personal data, is what keeps would-be bank robbers and cyber...
Blog

What is Computer Security Day?

    News Flash: It’s Computer Security Day!   Today, November 30, is Computer Security Day! These days, electronic devices like smartphones, tablets, and computers are a huge part of our everyday lives. They impact how we socialize, how we work, how we get around, and so much more. Although communication has become easier, efficient, and more...
Blog

Compliance for Healthcare: Secure File Transfer Holds the Key

  Complying with your doctor’s recommendations is the primary key to feeling good and staying healthy. Complying with the healthcare industry’s security standards and personal data protection requirements holds the key to avoiding an audit failure, paying steep fines, or trying to heal from the impact of a data breach. Sure, you can meet stringent...