Resources

Blog

Who is Protecting Your Healthcare Records?

  Image Patient Privacy is in Jeopardy: Data Breaches, High Payouts, and PHI How important is a patient's privacy? If your organization is a healthcare facility, the instinctive answer that comes to mind is "Very important!" After all, a patient's privacy is the basis upon which a doctor/patient relationship is based. Right? When...
Blog

The Biggest Cyber Risks Organizations Face Today

  Image   Today’s Biggest Cyber Risks   When your organization handles sensitive data on a consistent basis, the looming threat of cyber risks is around every corner. Although cyber threats aren’t going anywhere anytime soon, the good news is that resources like cyber threat intelligence metrics can help with analyzing risks and...
Blog

What Sets GoAnywhere MFT Apart

  Image GoAnywhere MFT has a whole suite of features that were designed to be flexible and to meet client’s needs. There is a lot of functionality packed into it and for good reason. Organizations have a wide range of needs and a wide variety of compliance requirements to think about when making a decision of what MFT product they’ll...
Blog

Why Banking Growth in Latin America Correlates with Cybercrime

  Image   Bancarization is Exploding in Latin America Latin America is the fastest-growing banking market worldwide, and growth is only expected to continue. Forecasts are anticipating 10 percent increases across all Latin American banking sectors through 2022. Bancarization refers to both the amount of access and the degree of...
Press Release

HelpSystems' Data Security Week LIVE to Give Powerful Insights into Navigating Today's Cyberthreat Landscape

MINNEAPOLIS (June 16, 2021)—HelpSystems today announced an upcoming virtual event designed to educate IT and security professionals about how to meet the challenges of the rapidly changing data security and compliance landscape. Data Security Week LIVE will feature a panel of security experts who will explore the often-hidden vulnerabilities surrounding corporate data in all...
Blog

How to Know it's Time to Implement an MFT Strategy

  Image As organizations are relying heavily on the exchange of digital files to conduct business, there’s a growing concern about the security of various file transfer methods. More companies are now utilizing managed file transfer (MFT) software solutions to send and receive digital files securely. Here’s what you need to know...
Blog

How to Use Cloud Data Transfer Solutions Effectively

  Image What is Cloud Data Transfer and Why Do Organizations Use It? Cloud data transfer is a process of moving data to and from a cloud computing environment. There are various needs that cloud transfers fulfill: one type of cloud data transfer takes data from a local, on-premises data center and brings it to the cloud. Another...
Blog

Top 12 File Transfer Frustrations

  Image Sending and exchanging files is a vital daily task in most organizations. However, this responsibility to exchange information comes with some pretty common frustrations and risks unless the file transfer process is secure and managed appropriately. Here are a few of the biggest frustrations in file transfers and some...
Blog

5 Topics You Should Know About in the World of Cybersecurity

  Image   Every year, organizations work hard to protect their data and analyze potential risks to it. However, as we’ve seen recently, the number of cybersecurity risks and data breaches has risen sharply. This makes it even more important to keep up with the newest cybersecurity guidelines and news so you can prepare your...
Press Release

Scammers Access 50% of Compromised Accounts Within 12 Hours According to New Research

FOSTER CITY, Calif. and LONDON (June 8, 2021) — Agari by Fortra, the market share leader in phishing defense for the enterprise, unveiled today the results of an investigation into the anatomy of compromised email accounts. The threat intelligence brief, titled Anatomy of a Compromised Account, is the first research of its kind, showcasing how threat actors use credential...
Blog

7 Signs You're Making the Most of GoAnywhere

  Image The measure of any tool is how effectively you’re using it. If you’ve already mastered the steps to get started with GoAnywhere, check out these features, projects, and automations to discover whether you’re making the most of your GoAnywhere setup. 1. You’ve Set up Secure Forms for Information Intake Standardize...
Blog

How to Meet Biden’s Executive Order on Cybersecurity Requirements

  Image On May 12, 2021, President Biden issued an executive order designed to improve the nation’s cybersecurity and to better protect federal government networks. The Executive Order on Improving the Nation’s Cybersecurity calls for stronger and more layered data security as part of a focus on data-centric security architecture...
Blog

The Top 10 Healthcare Data Breaches of 2020

  Image 2020 Was the Worst – in Healthcare Data Breaches Data breaches can have catastrophic consequences on those who are unfortunate enough to suffer from one. From steep costs and/or fines (in the millions) to a ruined reputation, data breaches are not to be taken lightly. This is especially true for the healthcare industry,...
Blog

Improve Your Big Data File Transfers: 11 Security Features to Consider

  Image New challenges and new opportunities have arisen due to big data, which is altering the nature of file transfer technology. The Good News Big data is leading to new file sharing technology, which is making it easier to solve certain big data file transfer problems. On the other hand, it is increasing the bandwidth...
Blog

What is Enterprise SFTP Software?

  Image What is Enterprise SFTP Software? The primary job of all SFTP software is to move files over a secure shell (SSH) connection. SFTP software can exist as a standalone tool, or as part of a larger software solution, such as managed file transfer (MFT). SFTP software can be made up of a client, a server, or both together. What...
Blog

TFTP vs. FTP vs. FileCatalyst: What is the Difference?

Transferring files over the internet is a common task in today’s digital world and it’s important to  protocol that fits your organization’s needs. A protocol is a set of rules and messages between a sender and a receiver. It functions much like a language that both ends of the network understand so the data arrives uncorrupted and with a proper file name. When it comes time...
Blog

Canadian Data Privacy Laws: An Overview

  Image Awareness and protections around how data containing private information is handled is ramping up across the globe, and Canada is no exception. Current data privacy laws in Canada include measures to protect individual privacy rights, transparency, access, and security. These laws are designed to give the public more control...
Blog

8 Reasons to Implement an MFT Security Solution

  Image Today’s businesses need to adhere to various security standards (e.g., PCI DSS, HIPAA, the GDPR) not only to prevent the high costs associated with data breaches, but also to avoid hefty penalties. Due to the large amount of data that organizations need to handle and protect, ensuring the security of data transferred among...
Press Release

HelpSystems' Robust Growth Draws New Investment from Harvest Partners SCF,LP

MINNEAPOLIS (May 6, 2021) – Fortra today announced that funds managed by Harvest Partners SCF, LP (“HP SCF”), the non-control private equity strategy of Harvest Partners, LP, have signed a definitive agreement to lead a minority investment in Fortra. HP SCF will join existing investors TA Associates (“TA”), Charlesbank Capital Partners (“Charlesbank”), HGGC and Fortra employees...
Blog

What is Drummond Certification?

  Image Drummond Certification: What is it? The Drummond Group is a third-party certification body that certifies software products and solutions to ensure a given solution does what it says it will. A security solution that goes through their extensive certification process earns the right to add the Drummond-certified distinction...