Blog

Blog

What is the DROWN Attack?

What is the DROWN Attack? T he Decrypting RSA with Obsolete and Weakened eNcryption (DROWN) Attack is a serious vulnerability that affects HTTPS and other serv ers that rely on Secure Sockets Layer (SSL)/Transport Layer Security (TLS). Essentially DROWN is an attack vector that leverages a cross-protocol bug in servers that support modern TLS by taking advantage of their support for the insecure...
Blog

Developing a Plan for Data Risk Management

What is Data and Risk Management? Data and risk management encompasses the processes and procedures an organization follows to safeguard the data it collects and stores. Data is today’s biggest asset—and today’s biggest target. If your organization has data, no matter now little or how sensitive, it’s at risk for leakage, theft, or attack. Sorry, that’s a little melodramatic—but cybersecurity...
Blog

Diversity and Inclusion, Government Action, Organizational Risks: This Month in Cybersecurity

Each month we break down some of the bigger cybersecurity news and tips for organizations to stay in the know and make informed decisions around their cybersecurity plans. From diversity and inclusion to government movements to protect businesses and agencies from potential cybersecurity attacks, as well as the latest information about organizational weaknesses that U.S. organizations share, this...
Blog

Is MFT Dead?

As cybersecurity technology continues to advance, some might ask whether secure MFT is fading away as a viable option for organizations to use for their file transfer needs. If organizations do choose to utilize MFT for their secure file transfer purposes, they will certainly select the best MFT software they can. The bottom line is that MFT will not be going anywhere, and not anytime soon...
Blog

The 5 Biggest Cybersecurity Threats of 2022: How to Avoid Cybersecurity Attacks

Cybersecurity is one of the biggest issues of our time. Organizations are gradually investing more and more into c ybersecuri ty . Microsoft expects to be investing upwards of $1 billion a year on cybersecurity for the foreseeable future and they certainly won’t be the only organization to increase their spending. In 2019, organizations began considering cybersecurity as one of the biggest threats...
Blog

How Windows Works with GoAnywhere MFT

What is MFT? Managed file transfer, often shortened to MFT, is a category of software solutions that centralize and secure data movement. The majority of MFT solutions offer automation and encryption to simplify file transfers within organizations and to trading partners. Related Reading: What is MFT and How Does it Work? What is GoAnywhere? GoAnywhere is a leading MFT solution that goes above and...
Blog

What is the Data Security Lifecycle?

Heists of yore claimed stacks of cash, gold bars, or even dazzling jewelry as their prizes. Today, data is the motherlode for criminals. And rather than enormous vaults and security guards, organizations now employ data security software to keep their data protected. Digital data requires different types of protection than locks and keys. And unlike physical goods, data typically needs to move...
Blog

What Are the Current Cyber Threat Trends in 2021?

Many current cyber threat trends hinge on change and uncertainty caused by the COVID-19 pandemic. Whether it’s a panicked email recipient falling for a phishing scheme, innovations in ransomware, or simply remote workforces offering larger surfaces to attack, the goal of each is to find gaps in your company’s cyber security armor. Here are the old, new, and evolving trends to keep an eye on, and...
Blog

7 Scenarios in Which to Use Encryption Software

Not sure what encryption software is used for – or maybe just when to use each type? Discover common file transfer scenarios and which data encryption protocol best fits your needs. What is Data Encryption Software? Data encryption software, also called file encryption software , solutions come in various forms: free or paid, robust or lightweight, and each uses one of a handful of encryption...
Blog

What is Ransomware-as-a-Service (RaaS)?

What is Ransomware-as-a-Service (RaaS)? Ransomware-as-a-Service (RaaS) is a new pay-for-use business model used by ransomware developers where malicious actors (known as affiliates) can outsource or lease already-developed ransomware attacks the same way legitimate software developers lease Software-as-a-Service (SaaS) products. Because RaaS is a subscription-based model and all it takes is...
Blog

This Month in Cybersecurity: E-Reader Threats and More

In the last month, a lot has happened in the world of cybersecurity . Cyber threats are more numerous than ever before , which has brought both private sector and government organizations to take remediation actions seriously . Let’s break down some of the biggest stories of the last month. Israeli Cybersecurity Firm Check Point Uncovers Major Security Flaw Cybersecurity is an issue everywhere...
Blog

Best Practices to Share Large Files for Work

There are thousands of ways you could share large files , both with your colleagues or with friends and family: you can choose from half a dozen popular file storage and synchronization services, specialized one-time services, or even email. But there are some differences in best practices when it comes to personal versus work file sharing, and these only get more complicated when you factor in...
Blog

What is PGP Encryption and How to Use It

Encryption is key to securing organizational data in the short term and long. However, there are a few different types of encryption that organizations can use to achieve the optimal level of security. GnuPG is one of the most notable. However, today we’ll break down how PGP encryption works and how to use it to maintain the safety of your files . The Pros and Cons of PGP Encryption PGP, otherwise...
Blog

Ransomware Attacks on Small Businesses: How to Mitigate

More than fireworks exploded as Americans were prepping for Independence Day celebrations as hundreds of companies awoke on July 3 rd to yet another massive ransomware attack. This attack attempted to cripple the networks of up to 200 companies and up to 1,500 downstream businesses. All signs point to it being the handiwork of a ransomware organization most likely based out of Russia, REvil, whose...
Blog

This Month in Cybersecurity: Bolstering Defenses and Best Practices

Every day, cybersecurity becomes more important for businesses. Organizations have a need to protect their customer data and the number of attacks that businesses have experienced has increased. The bottom line is that cybersecurity news and best practices are important to pay attention to. Without further ado, let’s get into some of the latest news in cybersecurity as well as tips and tricks for...
Blog

What is PGP and How Does It Work?

When someone in your organization wants to transfer a file – internally or outside of the organization – a few concerns may come up: Is the file complete? Is it being sent to the right place? Will it arrive intact? Is sensitive data protected and encrypted from unauthorized recipients? All are valid concerns, and each can be addressed with the help of encryption. By scrambling the data using one...
Blog

Who is Protecting Your Healthcare Records?

Patient Privacy is in Jeopardy: Data Breaches, High Payouts, and PHI How important is a patient's privacy? If your organization is a healthcare facility, the instinctive answer that comes to mind is "Very important!" After all, a patient's privacy is the basis upon which a doctor/patient relationship is based. Right? When it comes to patient data, the real answer may surprise you. While, of course...
Blog

The Biggest Cyber Risks Organizations Face Today

Today’s Biggest Cyber Risks When your organization handles sensitive data on a consistent basis, the looming threat of cyber risks is around every corner. Although cyber threats aren’t going anywhere anytime soon, the good news is that resources like cyber threat intelligence metrics can help with analyzing risks and understanding which evolving threats are relevant to your industry and geography...
Blog

Why Banking Growth in Latin America Correlates with Cybercrime

Bancarization is Exploding in Latin America Latin America is the fastest-growing banking market worldwide, and growth is only expected to continue. Forecasts are anticipating 10 percent increases across all Latin American banking sectors through 2022. Bancarization refers to both the amount of access and the degree of usage of financial services in a country or region. Both of these numbers have...
Blog

Top 12 File Transfer Frustrations

Sending and exchanging files is a vital daily task in most organizations. However, this responsibility to exchange information comes with some pretty common frustrations and risks unless the file transfer process is secure and managed appropriately. Here are a few of the biggest frustrations in file transfers and some solutions to help alleviate them. 1. Unreliable, Unsecure FTP File Transfers...