Blog

Blog

How to Help Ensure Compliance with Data Privacy Laws

  Image How to Help Ensure Compliance with Data Privacy Laws If complying with data privacy laws like the GDPR, PDPA, CPA, HIPAA, PCI DSS, PIPEDA, and more sometimes feels like swimming in alphabet soup, there is a life preserver that can simplify, secure, and automate the processes involved. Managed file transfer can proactively...
Blog

GDPR and Data Privacy after Brexit: What’s Next?

  Image So, the GDPR (General Data Protection Regulation) hit us with a bang in May 2018 and aside from a few high-profile fines, companies seem to be coping well on the whole. But is that really what’s happening or is it like an elegant swan, calm above water but flapping around underneath? It is safe to say that by now companies...
Blog

How Are Your Peers Utilizing Automation in GoAnywhere?

  Image   The Uses are Endless It’s no secret that automation is a great way to boost your business. It can save time, money, and important resources. But how is it being used by your peers on a day-to-day basis? Read on for some examples straight from your peers’ own personal experiences automating their file transfer processes. ...
Blog

Is Automation All It’s Cracked Up to Be?

  Image Automation is Key We’ve all had our moments of being skeptical when something sounds too good to be true. However, automation is no joking matter. Automation is a great way to boost your business by saving time, money, and important resources.       What is Automation? Automation is the use of electronics and/or...
Blog

Real-Life Ways GoAnywhere Saves Your Peers Time, Money, and Resources

  Image It’s Time to Get Real Let’s be real – time, money, and resources are all equally valuable in the business world. If you’re looking for a solution that can help you substantially save all three in your everyday life, look no further than GoAnywhere. Time After Time Time after time, GoAnywhere can help you maximize the time...
Blog

PDPA in Singapore Helps Protect Personal Data

  Image What is the PDPA of 2012? The Personal Data Protection Act of 2012 (PDPA) is a law designed to regulate and enforce the proper collection, use, disclosure, and care of the personal data of citizens in the Republic of Singapore. The Personal Data Protection Commission (PDPC) is charged with establishing policies and for...
Blog

Open PGP and GoAnywhere MFT: What You Need to Know

  Image       Which Solution is Right for You? Open PGP vs. GoAnywhere MFT If you have sensitive files that need to get from point A to Point B securely, you may have considered utilizing Open PGP or a managed file transfer solution, like GoAnywhere MFT. Do you know which option is the best fit for your organization? What is...
Blog

What is Operation Yellowhammer and How Does it Affect Data Transfers?

  Image   What is Operation Yellowhammer?   If you are located in the United Kingdom (UK), then you may already be familiar with Operation Yellowhammer and its relationship to Brexit and the European Union (EU). For those of you that haven’t been briefed on Operation Yellowhammer and how it relates to Brexit, now is the perfect...
Blog

GDPR: Understanding the 8 Rights of Data Subjects

Image Find out what these new rights mean for your organization and how you can prepare.   GDPR (General Data Protection Regulation) is the EU’s new legal framework that replaced the EU Data Protection Directive in May 2018. While the directive was merely a recommendation, GDPR carries the force of law. The purpose...
Blog

Automation Operations: 5 Benefits of Automation

  Image   Advantages of Automation Visions of a mechanized world flourished long before the term "automation" was coined. The star of Westinghouse’s exhibit at the 1939 World’s Fair was Electro, a robot that could walk, talk, and count on its fingers. Sadly, Electro and his kind were little more than demonstrations of remote...
Blog

5 Benefits of PGP Decryption Using Managed File Transfer

  Image If your trading partners or vendors require you to PGP encrypt or decrypt the files you exchange, you may be on the search for an affordable, trust-worthy PGP software to implement in your organization. The software you’re looking for may also need to support more than basic PGP decrypt and encrypt functionality. You may want...
Blog

Everything You Need to Know about FTP Automation Software

  Image So, you want to automate your FTP file transfers. Whether you send a dozen file transfers a week, hundreds a day, or even more, automation is a smart step for most businesses. The benefits are simple: automatic file transfers cut down on user errors, reduce or eliminate the need for scripts, free up manual time spent on...
Blog

10 Ways to Achieve Automatic File Transfers with GoAnywhere MFT

  Image Here’s a fun fact: When it comes to streamlining file transfer processes, secure FTP automation software is the supporting sidekick to any IT or cybersecurity professional. Like Robin supports Batman and Hawkeye supports Marvel’s Avengers, automatic file transfer software can support your pursuit for top notch cybersecurity,...
Blog

Understanding the GDPR (General Data Protection Regulation)

Image Note from the Editor: This is an older resource on GDPR. For more on the latest GDPR resources, check out our GDPR resource page. Table of Contents Introduction What is the GDPR? GDPR and the Data Protection Directive 2018: The Year of GDPR GDPR and Brexit GDPR Fines and Penalties How to...
Blog

The Benefits of File Transfer Automation

    Image Organizations today are challenged with maximizing their resources in a fiercely competitive environment. Benjamin Franklin famously said, “Lost time is never found again.” This is a problem that IT departments of all sizes have become familiar with. Take, for example, an IT staff member who spends countless hours...
Blog

OpenPGP, PGP, and GPG: What is the Difference?

  Image The privacy capabilities of encryption methods such as Pretty Good Privacy (PGP) allow organizations to achieve a hightened amount of data security and protection. There are various approaches and elements of comparison for these encryption methods, however, and each one comes with their own histories, features, and...