Blog

Blog

Top Data Breaches of 2019: How You Can Minimize Your Risks

  Image   Top Data Breaches of 2019: How You Can Minimize Your Risk   Your organization made the headlines! That’s great, right? Not if it’s because you had sensitive data breached. A data breach can wreak financial and logistical havoc for you, your customers, patients, employees, and others. More importantly, it can severely...
Blog

Resolve to Make Files More Secure in the New Year

  Image   Make Resolutions - AND Keep Them Resolutions. Every year you make them. Every year you break them. Make 2020 the year you finally resolve to make your file transfers more secure. Do it — even if you’re a stranger to the gym, you still sport those extra 10 pounds and haven’t called your mom in a week. Don’t wait until mid...
Blog

Comparing Transfer Methods: HTTP vs. FTP

Image   HTTP vs. FTP for File Transfer Hyper Text Transfer Protocol (HTTP) and File Transfer Protocol (FTP) are both application layer protocols that can allow you to transfer files between two systems, but what’s the difference between them – and which one performs better? Or, is there a better solution that outperforms both? Read...
Blog

7 Essential Resources on PCI DSS Security

  Image Note from the Editor: This article was originally published in February 2017. It has been updated with resources current to PCI DSS version 3.2.1. Did you know that 80% of organizations are not compliant with PCI DSS requirements? That means, if you’re reading this, there’s a pretty good chance your company needs to...
Blog

SCP vs. SFTP: Which is Better?

  Image The Secure File Sharing Matchup: Differences Between SFTP and SCP When sizing up SFTP vs. SCP you’ll find that the two file sharing protocols are quite similar. And, for some file transfer situations, they could be nearly interchangeable. Your need for speed, functionality and security will determine which protocol is best...
Blog

Need a Cloud-Based MFT Environment? Try a Hybrid Cloud Setup

  Image Cloud integration is growing in popularity, but committing 100% to the cloud isn’t always practical or secure for organizations. If you’re in the market for cloud-based solutions, read our quick overview below. For a more comprehensive exploration of when to choose a hybrid cloud and how keep your data encrypted through and...
Blog

10 Cybersecurity Tips and Best Practices

  Image   The 10 Best Cybersecurity Tips and Practices – as Told by IT Professionals   Although there’s a lot of tips and best practices out there when it comes to cybersecurity, it’s important to make sure they’re coming from the right source. With October being National Cybersecurity Awareness Month, now is the perfect time to...
Blog

What are SFTP Servers?

  Image   What are SFTP Servers? A typical file transfer server helps transfer files server-to-server or client-to-server, and SFTP servers are a more protected version: they encrypt data to keep sensitive information secure while moving files, and some have the added bonus of encrypting files at rest. SFTP servers use a single...
Blog

What Port Does SFTP Use?

  Image       Different Protocol, Different Port Ports, also known as channels, are an integral part of the successful delivery and communication process of secure files. Although the specific protocols that operate on these ports makes the most difference, are you aware of which actual port SFTP uses? What is SFTP? SFTP (SSH...
Blog

Open PGP and GoAnywhere MFT: What You Need to Know

  Image       Which Solution is Right for You? Open PGP vs. GoAnywhere MFT If you have sensitive files that need to get from point A to Point B securely, you may have considered utilizing Open PGP or a managed file transfer solution, like GoAnywhere MFT. Do you know which option is the best fit for your organization? What is...
Blog

Which is Faster: FTPS or SFTP?

  Image FTPS vs. SFTP You may have heard of FTPS and SFTP, but chances are that you may not be super familiar with them. If you haven’t had a chance to dive in deep, read on for a more in-depth look into FTPS, SFTP, and which of the two is faster. What is FTPS? FTPS (FTP over SSL/TLS), or File Transfer Protocol over Secure Sockets...
Blog

Which is Better? - AS2 vs. AS4

  Image   AS2 vs. AS4   AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and which of the two is better? What is AS2? AS2 (Applicability Statement 2) is a protocol specification that’s used to transmit...
Blog

Think Your Customer Data was Exposed? Follow These Steps

  Image When a prospect or customer shares personal data with a business, they expect their information will be stored securely, kept safe from vulnerabilities, and used only for the purposes with which it was collected. Whether this data is an email address, a birthday, a personal identifier, or credit card numbers, the weight of...
Blog

Is FTP Dead?

  Image Is FTP still a viable option for sending file transfers? While organizations across all industries have started shifting to secure FTP protocols like SFTP and FTPS, a surprising number of businesses still use FTP to transfer sensitive documents across internal and external networks. The search "how to use FTP" comes up with...
Blog

Are SFTP Files Encrypted?

    Image The definitive answer to "Are SFTP Files Encrypted," is yes! SFTP, short for Secure Shell (SSH) File Transfer Protocol is a network protocol that organizations use to secure and send file transfers. SFTP is firewall-friendly, supports key-based authentication, encrypts usernames and passwords, and implements strong...
Blog

I’ve Just Been Breached, Now What?

  Image So, you think (or perhaps you know) you’ve been breached. It’s every organization’s nightmare, and you’re living it, facing local and federal fines, upset customers, public panic, and a loss of intellectual property. A breach can be a harrowing ordeal; if you’re not sure what to do immediately after discovering the breach,...
Blog

40 Cybersecurity User Groups, Forums & Communities to Join

  Image What is the best cybersecurity resource? Answer: other people! Today more than ever, people are connecting with each other over shared problems and interests. Maybe there’s a particularly tricky problem that’s taunting you. Maybe you have exciting best practices to share with other professionals. Whether you’re a...
Blog

7 Benefits of Using MFT for Encrypted File Transfers

  Image   7 Benefits of Using MFT for Encrypted File Transfers   At minimum, a managed file transfer (MFT) solution is a product that encompasses all aspects of inbound and outbound file transfers while using industry-standard network protocols and seamless encryption. It can automate and transfer data across your network, systems...
Blog

The Key Differences Between SFTP and FTP

Image Last Updated 05/03/2024 Are SFTP and FTP the same? While they both transfer files, the answer to this question is ultimately, NO. Secure File Transfer Protocol or SSH File Transfer Protocol (SFTP) and File Transfer Protocol (FTP) are NOT the same thing. SFTP, not to be confused with FTP Secure (FTPS), is a network SFTP is an...
Blog

Everything You Need to Know About Open PGP Encryption

Image What is Open PGP? PGP is the backbone of Open PGP. It is an open source standard that allows PGP to be used in software that is typically free to the public. The term "Open PGP" is often applied to tools, features, or solutions that support open source PGP Encryption technology. It is Internet Engineering Task Force (IETF)...