x Close

Take a Tour

Secure File Sharing Blog

B2B File Sharing Blog

Secure file sharing software information, file sharing trends and announcements.

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices Secure File Sharing The Cloud

Common Delivery Methods for One-Time Password (OTP) Authentication

Over the last few weeks, we have focused on authentication progressing through an overview of Multi-Factor Authentication (MFA), the most used type of MFA – one-time password (OTP), and today we will review some of the most common delivery methods for OTPs (One-time passwords). Regardless of which One-Time Password (OTP) authentication method you use, choosing an OTP generator like an authenticator app or key fob is a safer way to use MFA/OTP than, say, SMS texting. Cyber criminals have found ways to intercept SMS codes, whether it’s SIM card fraud, accessing an iCloud or Google account tied to your messaging, or by sending you an infected link allowing them to take control of your phone remotely and view your messages directly on your device. While SMS-based MFA might be better than no MFA at all, it is a lot less secure than using a hardware/physical key code generator like a key fob (which we reviewed in our last blog) or having an authenticator app on your mobile device.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices Secure File Sharing The Cloud

One-Time Password (OTP) Authentication Methods You Should Know – HOTP + TOTP

The evolution of multi-factor authentication (MFA) is like that from the turning rotary phone, to the first mobile phones, and then the smartphones we use today. The ever-changing landscape of threats and best practices has led to constant innovation in authentication. The MFA we have today is vastly different from that of the ’90s when the earliest form of two-factor authentication (2FA) was invented and patented by AT&T. 2FA is just as the name implies: in addition to a password, an additional factor of authentication must be used to ensure the users' identity. This is especially true when it comes to your personal information (PII) or your organization’s proprietary information (PI). As we all know, a password is only as strong as the person using it, and to remember a password a user may tend to make it something easy like password123! or write it down and stick it to the back of their keyboard. This makes the idea of adding a second form of authentication very appealing as it could drastically decrease the risks associated with weak password policies and poor security practices. In fact, this has been proven to be highly effective at stopping cyber attacks using username and password combinations.

Read More
Secure File Sharing

Get the answers to your secure file sharing questions!

Are you trying to select a new file sharing solution, but you have a few questions first? Explore these common questions about file sharing solutions and find out their answers.

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices Secure File Sharing The Cloud

Authentication 101: Understanding Multi-Factor Authentication (MFA) to Protect Your Business

In the IT industry there are many words used when discussing the topic of authentication. Some of those words often used are multi-factor authentication (MFA), two-factor authentication (2FA), time-based one-time password (TOTP), one-time password (OTP) and more. It is important to understand that here are dependencies and differences amongst these terms. For example, two-factor authentication (2FA) is a subset of multi-factor authentication (MFA) because it requires more than 1 form of authentication - i.e 2FA is under the MFA umbrella. Additionally, there are multiple types of 2FA/MFA such as one-time password (OTP). Lastly, there are variations of OTP methods like TOTP, HOTP, etc. Therefore, all of the above would be considered multi-factor authentication. Your authentication method(s) can thwart would be attackers. It seems like all too often we hear about a different company falling victim to a cyberattack (some of which are massive enterprise corporations/conglomerates). In this blog we take a look at the various methods of authentication available to protect your business. 

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions Secure File Sharing The Cloud

Data Security Breaches: The Consequences + Hacking Prevention Best Practices

Over the last month we have written several pieces of content reviewing the differences in the infrastructure, software, and categories of file sharing/file transfer solutions. This blog will be the last installment of this series. In this blog we deep dive into some of the largest security breaches in the file transfer/file sharing industry, the consequences and how to avoid falling victim to a cybersecurity attack. One of the largest growing security threats in business today is data and information security. Protecting your organizations files and other important data from hackers is crucial to business operations. Unfortunately, the damaging effects of a data breach have impacted some of the largest companies in the world like Accellion, AWS, Morgan Stanley, CVS, Wegmans, Microsoft, Facebook, HubSpot and more. On the surface, many of these organizations seemed like they would be impenetrable. The size or nature of your business does not matter. It is more important than ever to protect your information from hackers – specifically enterprise data such as personal identifiable information (PII), personal healthcare information (PHI), payment information, or covered unclassified information (CUI). It is crucial to understand that how this data is sent or shared, stored and received is any organizations biggest threat.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions Secure File Sharing The Cloud

Key Differences: EFSS vs MFT/MFTaaS

In our last few blog posts, we’ve explored potential options and solutions for file transfer platforms. However, we wanted to specifically emphasize the comparison between MFT (Managed File Transfer)/MFTaaS (Managed File Transfer as a Service) and EFSS (Enterprise File Sync and Share). Some key terms we hear regularly in IT conversations - specifically about data/information or file sharing/transfer - are MFT (Managed File Transfer), MFTaaS (Managed File Transfer as a Service) and EFSS (Enterprise File Sync and Share). Both MFT and EFSS can be implemented on premise, in the public cloud, private cloud, or hybrid cloud, while MFTaaS is marketed as a SaaS option where your organization is procuring the management and software from a vendor such as FTP Today to remove the additional management load of infrastructure, platform, configuration and monitoring from administrators. Additionally, all these solutions are going to be used for transferring or sharing data/information, files, etc. to/from multiple devices, locations, users, organizations, but EFSS stands in contrast to MFT/MFTaaS. An additional concern for IT being burdened with the task of deciding if EFSS or MFT/MFTaaS is the more secure option. This is caused by the rise of external information security regulations and internal increases in security posture requiring more robust cybersecurity defense. There is confusion around the resemblance of these solutions. Can these solutions be used synonymously? When should you use one or the other? Do these solutions do the same thing? We wrote this blog to hopefully clear up some of these questions!

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions Secure File Sharing The Cloud

File Transfer + File Sharing Software Solutions

What is File Transfer + File Sharing? File sharing is the practice of sharing or enabling access to digital media, including documents, video files, graphics, etc. Anytime you are moving one or multiple files, documents, etc. from one place to another you are executing a transfer if information! Isn’t this exciting stuff? What is Secure File Transfer + File Sharing? Secure file sharing is the act of sharing information (files, folders, etc.) digitally and securely by protecting this information from unauthorized users, intruders, and other malicious manners. When a business or organization needs to share or transfer confidential information to specific person or group it becomes the utmost importance to ensure you are transferring information and sharing files securely.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions Secure File Sharing The Cloud

IT Infrastructure Choices for File Transfer + File Sharing Solutions

Since the beginning of the internet, it’s been necessary for organizations to transfer data from one location to another for processing, to store it for a future purpose, or to share the information with others. The 1’s and 0’s that makeup the data today are the same as when the internet first launched in 1984. But what’s changed? The answer (as you intuitively may have guessed) is almost everything else. As Plato said: “necessity is the mother of invention,” and as we began transferring more and more information around the globe and into our homes and offices, we needed larger, faster networks, and increasingly advanced platforms to accomplish this. We curated this high-level overview to provide a full picture of the infrastructure solutions that exist in the market today and the advantages and risks of each.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions Government Compliance Secure File Sharing The Cloud

CMMC 2.0 Controls Made Easy for Small & Mid-Sized Contractors

When the Department of Defense initially announced version 2.0 of its Cybersecurity Maturity Model Certification (CMMC), it was meant to be good news for small and mid-sized businesses and contractors that work with the United States Military. CMMC 1.0 put a heavy burden on these smaller organizations to create systems and manage controls that they simply didn’t have the in-house resources to create and manage. But planning for the CMMC 2.0 model brings to light just how challenging compliance remains for small- and mid-sized organizations. While CMMC version 2.0 has been framed as less of a burden for smaller businesses and contractors, there’s still a lot of work to be done to reach full compliance.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions Government Compliance Secure File Sharing The Cloud

DoD SAFE Alternatives: How to Efficiently Share Files with the U.S. Military

The U.S. Department of Defense (DoD) manages an annual budget that stretches into the hundreds of billions. Much of that money is spent with the 100,000-plus third-party contractors that participate in the nation’s defense industrial base (DIB). The DoD and these contractors must share files and information, and they must do so in a secure manner — for obvious reasons. Today, the DoD offers DoD SAFE as a portal where DIB contractors and members of the U.S. military can share PII-, PHI-, and CUI-related files securely. But is DoD SAFE the best option for your organization? There are DoD SAFE alternatives that are easier to use while providing a level of security that meets DoD expectations for files that fall into these categories. If you’re one of the many defense-related contractors searching for DoD SAFE alternatives, continue reading to learn more about the history of DoD SAFE and your other options for securely sharing files with the U.S. Military.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions Secure File Sharing The Cloud

ExaVault Alternative

The search for a secure file-sharing solution can lead you all over the internet. As moving to the cloud and SaaS applications have grown in importance in the 21st century, so has the ecosystem of Managed File Transfer and online FTP providers and other services that can help with safe, secure file storage and sharing. Files.com and ExaVault are two of the providers you may come across, along with FTP Today. However, the ecosystem has become a little smaller as Files.com just announced that it has acquired ExaVault. This indicates that significant changes are coming over the next 12 months with regard to ExaVault’s application and to its customers, including being migrated to Files.com’s application and pricing. This may leave many of ExaVault’s customers looking for ExaVault alternatives.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices Secure File Sharing The Cloud

How to Setup a Secure FTP

File transfer protocol has been around for decades. But FTP as originally conceived was not necessarily a secure way to transfer files between two parties. Things are different today. Organizations that need a secure protocol for transferring files have access to plenty of FTP alternatives that can get the job done. In this post, we will walk through your secure FTP alternatives, and we will also provide guidance on how to set up a secure FTP system for your business. If you have any questions about secure FTP, you can always reach out to us to learn more.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices Secure File Sharing The Cloud

Data Security Best Practices

Cybersecurity threats exist all around us, no matter what industries we may work in. The organizations that emphasize computer security best practices are the ones that will succeed at preventing threats from becoming realities. Training in computer security isn’t always handled properly, though. To ensure that your organization is staying safe from cybersecurity threats, here’s a look at computer security best practices for fighting internal and external threats, as well as best practices for keeping data safe from former employees.

Read More

Blog Feature

CMMC Cyber and Data Security DFARS EAR FTP Solutions GOVFTP Cloud Government Compliance ITAR NIST Secure File Sharing The Cloud

How to Plan for Changes to CMMC Requirements

By now, all contractors that work with the U.S. Department of Defense should be fully aware of the Cybersecurity Maturity Model Certification (CMMC) 2.0 announcement from November 2021. The CMMC 2.0 announcement included updates to CMMC 1.0 that were designed to enhance cybersecurity protections for all entities in the defense industrial base, or DIB, and also streamline protections for contractors already utilizing the NIST 800-171 framework. While the announcement of last November did provide a glimpse at what the DOD’s requirements might be in the future, Congress has yet to codify those requirements into a law to be followed. Unfortunately, that leaves contractors and others in the DIB in a limbo period where they know that new CMMC requirements are coming — but they don’t know exactly what those requirements will be. We’ve written previously about the proposed CMMC 2.0 framework and what it might require of contractors. Now we’ll address what contractors and others in the DIB can be doing right now during this limbo period to set their organizations up for future success under CMMC 2.0 once codified by law. While there’s a lot of confusion about what can be done presently, it’s best for DIB members to focus first on Level 1 requirements as outlined by the CMMC 2.0 announcement late last year. The following 17 specific practices are required for Level 1 compliance. They represent basic security hygiene that you can implement for your organization: limiting physical access to your facility and systems, securing storage and transport of data, and monitoring your systems usage are good places to start. Also, note that Level 1 compliance is the basis for Level 2 compliance.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices Secure File Sharing The Cloud

What to Look for in Enterprise FTP Solutions

Large enterprises operating in the cloud need compliant and secure environments for transferring sensitive files: files that include personal information, proprietary information, HIPPA-protected information, information related to national defense, plus more. These large corporations might have the expertise, but typically don’t have the time needed to build and secure their own file-sharing systems. In-house team members are typically being pulled in a multitude of directions by other business units, which is what makes enterprise FTP solutions and platforms so attractive. Enterprise FTP solutions can provide the high number of concurrent connections, plentiful user licenses and large amounts of storage that large businesses require. What specifically should you be looking for in enterprise FTP solutions? Here's a 7-point checklist of must-haves for large companies exploring file transfer solutions.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions Secure File Sharing The Cloud

What is FTP? Everything You Need to Know About File Transfer Protocol

FTP, also known as file transfer protocol, is a process that organizations can use to transfer large and/or sensitive files from one location to another. Secure “versions” (or alternatives) of FTP (SFTP, FTPS) are especially useful in the defense, legal, healthcare, manufacturing, and finance industries. However, FTP generally speaking, is used in almost every industry where the sharing of information is necessary. But what is FTP exactly? At FTP today, we have a team of dedicated secure file transfer experts who are always available to talk about your organization and its file transfer needs. Continue reading for a deep dive into FTP, and contact us if you would like to schedule a time to discuss FTP and what it could mean for your business.

Read More

Blog Feature

Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices Secure File Sharing The Cloud

How Does FTPS Work? Get to Know This Popular Protocol for Secure File Sharing

Corporate servers are loaded with sensitive information. If this information falls into the wrong hands, it could lead to regulatory violations, breach-related liability and even embarrassing headlines. An ecosystem of frameworks and protocols has grown out of the need for secure data storage and sharing. FTPS is one of those protocols used to protect data in transit. But how does FTPS work? And what makes it different from other file-sharing protocols? We’ll address those questions and others below. Continue reading to learn more about your options for secure file storage and sharing, and get in touch with the FTP Today team to ask questions or talk about your organization’s specific file-sharing needs.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices Healthcare Compliance PCI Secure File Sharing The Cloud

HIPAA Compliant File Sharing

In late summer 1996, the President of the United States signed into law the Health Insurance Portability and Accountability Act. This law today is better known by its acronym — HIPAA. HIPAA is designed to protect the private and personal information of healthcare patients, including “diagnosis, treatment information, medical test results, and prescription information.” While HIPAA is no doubt an essential law for protecting patients and their health-related information, it does create a burden for companies and other organizations that store and transfer files that contain HIPAA-protected information. See below for more information on HIPAA-compliant online file sharing.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices Legal Compliance PCI Secure File Sharing The Cloud

How to Find Secure File Sharing for Law Firms

All organizations store and share files and data that are sensitive on some level. Health care is the No. 1 industry for storing and sharing sensitive files, followed closely by the legal industry — which makes secure file sharing for law firms a priority that too often goes overlooked. The volume of sensitive information handled by law firms, this includes both corporate information and sensitive data related to tax returns, makes the legal industry a major target for hackers. This calls for strict policies around how that information can be stored and shared digitally. Bloomberg reports that more than 80% of the top 1,000 law firms in the world had sustained a recent data breach. That’s bad news for firms – and their clients. Breaches can be costly, not just because of ransomware payouts but also due to the damage to a company's reputation that emerges from a breach. The good news is that tools exist to make secure file sharing for law firms a reality.

Read More

Blog Feature

Compliance Cyber and Data Security EAR FTP Solutions GOVFTP Cloud Government Compliance ITAR NIST Secure File Sharing

Everything You Need to Know About Aerospace Industry Regulations and Cybersecurity

The aerospace industry is a big business — and it’s only going to get bigger in the coming years. In 2020, the global aerospace industry reached $298 billion. That figure is expected to grow to $430.9 billion by 2025 (an expected 45% increase in 5 years). The size of the industry and it’s expected growth is even more impressive when you consider the many aerospace industry regulations that companies must adhere to. The challenge with operating in aerospace is that almost everything designed, built or created has defense-related implications. Indeed, trade organizations (like the Aerospace Industries Association) and the U.S. government have established stringent regulations and security frameworks to prevent the aerospace industry’s products and data from falling into the wrong hands. These regulations can be burdensome for aerospace companies. But they can also represent an opportunity for aerospace companies to put into place the right tools and technologies for making compliance easier and more automated. Here’s a look at the most relevant aerospace and defense industry regulations — the AIA’s NAS9933, NIST SP 800-171, ITAR and EAR — plus a rundown of how aerospace companies can benefit from compliance.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance SOC Secure File Sharing The Cloud

What is SOC 2? Why it’s Important to Your Organization

In the modern age, cybersecurity has become a serious priority for organizations operating in both the public and private sectors. Government entities prioritize cybersecurity to prevent foreign actors and third parties from accessing state secrets. Corporations and other businesses prioritize cybersecurity to prevent ransomware, the loss of proprietary information and trade secrets, and generally to secure any information and files they store and share. What is SOC 2 and where does it fit within the emerging cybersecurity universe that’s growing more important with each passing year? SOC, an acronym for “System and Organization Controls,” is a cybersecurity risk management reporting framework that includes different levels for different types of organizations — SOC 2 is the second level of the framework designed for service providers. The SOC framework and SOC 2 requirements for service providers have become a universally accepted standard for securing information, data and files. At FTP Today, we are SOC 2 certified with the GOVFTP Cloud in scope. This is one of the best ways to ensure we’re securing our users’ data and files while minimizing the risk of outside threats. See below for more details on the SOC framework, on SOC 2 compliance, plus what it means for your organization.

Read More

Blog Feature

Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Secure File Sharing The Cloud

Why Rent A Dedicated FTP Server?

The need for an FTP hosting service becomes apparent to any organization that handles, stores or shares sensitive files. Once your organization recognizes the need for an FTP hosting service, and once it realizes in-house solutions are cost-prohibitive, it’s time to answer this question: Should you rent a shared or dedicated FTP server? No two organizations are exactly alike, so this question must be answered on a case-by-case basis. Dedicated FTP servers provide a number of benefits that your organization may want to take advantage of. Here’s a look at the 4 primary benefits of choosing to rent a dedicated FTP server rather than using shared FTP infrastructure.

Read More

Blog Feature

Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Latest Features Secure File Sharing The Cloud

Introducing Our User Facing Clickwrap Agreement Feature

FTP Today recently launched our new User Facing Clickwrap Agreement feature (also known in the industry as a clickthrough agreement). The FTP Today clickwrap agreement feature is only available on our advanced plans. If you are not currently an FTP Today customer and are interested in learning more about our plans and pricing, contact an FTP Today expert to learn more.  If your subscription plan has this feature, you now have the ability to enable and configure clickwrap agreements that force all users to explicitly acknowledge custom terms and conditions before logging in to your FTP Today account. The initial launch of FTP Today clickwrap agreements is just the first step. In the future, we anticipate offering different types of clickwrap agreements for different types of users — for example, a clickwrap agreement for internal users plus a separate clickwrap agreement for external users. Clickwrap agreements have become essential tools for businesses that operate online in any capacity. At FTP Today, we’re constantly adding new features and tools that empower organizations to protect their files, data and information, as well as empower organizations to protect themselves from liability. Continue reading to learn more about our clickwrap user agreement feature and how administrators can configure a clickwrap agreement within FTP Today. If you have questions or would like to see a demo of our clickwrap agreements, get in touch with us.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance NIST Secure File Sharing The Cloud

NIST 101: Everything You Need to Know About the NIST Framework

Even if you’ve only dabbled in cybersecurity, you’ve likely heard the acronym NIST — which stands for National Institute of Standards and Technology. Behind that simple acronym are huge implications for organizations that experience cybersecurity threats or that regularly handle sensitive files and information. The NIST framework for cybersecurity can help keep your organization safe from breaches, and it can also help you achieve compliance so that you can work with other organizations and government agencies that are concerned about cybersecurity. To help you better understand the NIST framework for cybersecurity, here are in-depth details about NIST and specific publications relevant to cybersecurity and the protection of sensitive files and information.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Latest Features Secure File Sharing The Cloud

Introducing Our Session Lockouts Feature — for a More Secure FTP

In mid-November, FTP Today launched a new session lockout feature that will create a more secure FTP hosting experience for our users. This new feature slows down and defeats cyber-attacks, and it’s also a key component to complying with certain cybersecurity regulations and standards. Sessions lockouts are available through three of FTP Today’s pricing plans: Premium, Ultimate and Dedicated Server. To start taking advantage of this new feature, sign into your administrator dashboard and click on the Account Lockout Policy tab on the left. Visiting this tab will give you the opportunity to configure session lockout settings by IP address and username. You can enable or disable the feature, set the number of login failures that will trigger a lockout, adjust the tracking window minutes, and change the number of lockout minutes. See below for more details on the benefits of session lockouts, as well as more information on taking advantage of and customizing session lockouts for your organization. As always, our team is here to help if you have any questions or would like to further discuss session lockouts.

Read More

Blog Feature

CMMC Compliance Cyber and Data Security DFARS EAR FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance ITAR NIST PCI Secure File Sharing The Cloud

Data Encryption Best Practices

File transfer protocol (FTP) as it was first conceived included no encryption. In the earliest days of FTP, senders and recipients of files logged in with usernames and passwords in plain text, and files were passed from one party to another without encryption. That’s not the case with modern FTP providers. They apply modern data encryption best practices to FTP transactions so that file transfers are conducted with the utmost security. What data encryption best practices should you be following? Here’s a look at different types of encryption, encryption needed for secure file transfers, plus details on how FTP Today handles encryption for its clients.

Read More

Blog Feature

CMMC Compliance Cyber and Data Security DFARS EAR FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance ITAR NIST PCI Secure File Sharing The Cloud

CMMC 2.0: How the DoD’s Cybersecurity Certification is Changing

The body that oversees Cybersecurity Maturity Model Certification (better known as CMMC) has just announced version 2.0 of its standards. This updated version of CMMC is significant for organizations that are part of the defense industrial base — organizations numbering 300,000-plus that comprise the supply chain for defense-related projects in the United States. See below for more details on CMMC 2.0, plus what those changes mean for organizations that work on projects with the U.S. Department of Defense.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Secure File Sharing The Cloud

8 SFTP Best Practices for Your Business

You’ve likely heard of FTP as a protocol for sharing files and information across the Internet. You may have also heard of SFTP, but what exactly is the difference? Below, you’ll find details on the differences between FTP and SFTP, plus the reasons why SFTP is the most secure way to share sensitive information outside your organization. To make sure you’re maximizing your use of SFTP hosting, we’ve also included a comprehensive list of SFTP best practices. Want to learn more about SFTP cloud server options, use of SFTP, SFTP cost, and general SFTP cloud solutions? Our team is always here to help. Contact us to chat with an SFTP expert.

Read More

Blog Feature

Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Secure File Sharing The Cloud

What to Look for in FTP Hosting: 10 Essential Features & Benefits for 2022

FTP servers empower users to download and upload needed files and information securely. Because the use of FTP servers is the best way to share sensitive information, many organizations are seeking out FTP hosting solutions. But the FTP hosting landscape is full of different providers that offer a range of features and benefits. How can you know exactly what your organization needs? See below for 10 FTP hosting features and benefits that are absolutely essential for secure FTP hosting in 2022 and beyond.

Read More

Blog Feature

Cyber and Data Security EAR FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance ITAR Secure File Sharing The Cloud

ITAR Compliance Tips for 2021 and Beyond

The United States is likely to spend more than $700 billion on national defense in 2022. A big portion of that budget will be spent on contracts with third-party businesses — contractors who provide products, materials and services to the U.S. military. But, if you want to work with the U.S. military, you need to understand ITAR compliance and how it empowers you to secure a contract. If your business would like to work with the U.S. military, or continue to work with the U.S. military, here’s a look at everything you need to know about ITAR — and ITAR compliance requirements.

Read More

Blog Feature

Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Secure File Sharing The Cloud

Comparison: Buy vs. Rent an FTP Server

Organizations that regularly handle, store and share sensitive information often rely on file transfer protocol — FTP for short. These organizations — like law firms, financial institutions, medical providers, government agencies and others — are forced to make a decision. Is it better to buy vs. rent an FTP server? There’s a clear answer to this question for organizations that need an FTP server to securely manage sensitive information and documents. Here’s a rundown of what FTP servers are used for, how they are different from HTTP servers, plus the costs and benefits to consider when debating whether to buy vs. rent an FTP server.

Read More

Blog Feature

Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Secure File Sharing The Cloud

File Share Best Practices for 2021 and Beyond

Cybercrime has skyrocketed in the last 18 months. Malware, phishing and other tactics are widely known, and IT teams go to great lengths to protect their organizations from these attacks. But companies that aren’t following file share best practices could also be at risk.

Read More

Blog Feature

Cyber and Data Security DFARS FTP Solutions GOVFTP Cloud Government Compliance ITAR NIST PCI Secure File Sharing The Cloud

FTP Today Partnership with Carahsoft for GOVFTP Cloud

In a press release last year, Carahsoft announced FTP Today has joined the Carahsoft Cloud Purchasing Program (CPP). The program is for government contractors who rely on CarahPoints to purchase the software and tools necessary to run their business. Continue reading to find out what this could mean for you!

Read More

Blog Feature

Announcements Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance ITAR Latest Features Secure File Sharing The Cloud

Drive Mapping: Everything You Need to Know

On more than one occasion, our clients have asked if it’s possible to map files directly to a computer drive from the FTP Today application, whether that be The FTP Cloud or the GOVFTP Cloud. The process of this is called ‘drive mapping’ throughout the industry, and it is simple to accomplish. Today, we’re going to walk you through how drive mapping works, options for drive mapping, and finally, how to do so with FTP Today. 

Read More

Blog Feature

Announcements Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance ITAR Latest Features Secure File Sharing The Cloud

What is an API (Application Programmable Interface)? The Basics & Benefits

Recently, FTP Today launched a new feature as part of our platform called an Application Programming Interface, otherwise known as an API. Don’t be intimidated by the name! An API is useful for many things, and if your organization has access, it’s something you should take advantage of. This blog is meant to give an overview of what an API is and how it works.

Read More

Blog Feature

Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance ITAR Secure File Sharing The Cloud

Single Sign-On (SSO) Explained: What is SSO, How it Works, Why it Improves Security & More

In recent years, FTP Today has received many questions from our customer base regarding Single Sign-On, otherwise known as SSO. This blog is meant to educate the reader on definitions and use cases as the technology has become widely adopted across organizations of all sizes for administration and security purposes.

Read More

Blog Feature

FTP Cloud FTP Solutions GOVFTP Cloud Secure File Sharing

Compare File Sharing Solutions Before Committing: Free Trials for Your Proof of Concept

Are you looking for a secure FTP hosting option  or a file sharing solution that will fit your company's needs? A simple internet search will show you the sheer number of options available. How will you choose the right one?  A smart way to ensure you pick the ideal file sharing solution for your business is to schedule free trials, so you get a feel for the solution and its capabilities. This is called Proof of Concept (P.O.C.). It’s also wise to see how each solution stacks up against the competition.   Let’s look at the Pros and Cons of different  secure file sharing solutions  and their Free Trials to determine which one is ideal for your business. Here are the top players, listed alphabetically.

Read More

Blog Feature

CMMC Cyber and Data Security DFARS FTP Solutions GOVFTP Cloud Government Compliance ITAR NIST Secure File Sharing

How GOVFTP Cloud Managed File Transfer Compares to Microsoft SharePoint GCC

You might be asking yourself, “why are collaboration platforms competing with Managed File Transfer (MFT)?” Great question. Normally, they don’t, and to be honest -- they shouldn’t. These are not the same. The commonality regarding these two is mainly that files can be stored or sent within MFT and MFT as-a-Service (MFTaaS) platforms, as well as within collaboration platforms. However, as we’ll see later, it’s not without difficulty if you’re trying to use a collaboration tool like Microsoft O365 as a MFTaaS tool.

Read More

Blog Feature

CMMC Cyber and Data Security DFARS GOVFTP Cloud Government Compliance ITAR NIST Supply Chain

Securing the Supply Chain - Meeting CMMC Compliance

This blog post is the culmination of our Securing the Supply Chain series. In our second blog post Securing the Supply Chain - Meeting NISP SP 800-171 R2 we provided information on meeting compliance with DFARS (Defense Federal Acquisition Regulation Supplement) contracts clause 252-204-7019, which triggers your compliance with NIST 800-171 R2 by uploading your self-assessment, System Security Plan, and any Plan of Accreditation & Milestone (POA&M - Plan Of Actions and Milestones) to SPRS (Supplier Performance Risk System) system. Our initial blog covered what the government wants you to protect, the interim rule, Cybersecurity Maturity Model Certification (CMMC) levels, and how to get started. In this blog we start the journey toward meeting compliance with CMMC. We begin with first meeting compliance with NIST SP 800-171 R2, the latest self-assessment and self-attestation standard. Ultimately, over the next five years (by 2026), you will be required to meet DFARS contract clause 252-204-7021, which will trigger compliance with appropriate level of CMMC compliance.  The Cybersecurity Maturity Model Certification (CMMC) is a compliance framework for Defense Industrial Base (DIB) contractors to safeguard intellectual property of United States. DIB contractors must properly safeguard, disseminate, and destroy Controlled Unclassified Information (CUI). As a DIB contractor, you will need to comply with the appropriate CMMC maturity level to renew a contract, compete for a new contract or receive an award of a contract. In this blog we give you the information you need to meet CMMC compliance.

Read More

Blog Feature

CMMC Cyber and Data Security DFARS GOVFTP Cloud Government Compliance ITAR NIST Supply Chain

Securing the Supply Chain - Meeting NIST SP 800-171 R2

This blog post is a continuation of The CMMC Basics where we covered what the government wants you to protect, the interim rule, Cybersecurity Maturity Model Certification (CMMC) levels, and how to get started. In this blog we start the journey toward meeting compliance with CMMC. We begin with first meeting compliance with NIST SP 800-171 R2, the latest self-assessment and self-attestation standard.  The United States government is challenged with securing the supply chain to reduce theft of intellectual property, collection of intelligence by foreign adversaries, and introduction of counterfeit products. The Department of Defense (DoD) must assure that the mission of the warfighter is not compromised, furthermore the research and development, ideas and product specification are not stolen. As we become more of an interconnected world, this will be more challenging, so you must take steps to assure that you are keeping your information safe as a Defense Industrial Base (DIB) vendor. If you are among the over 300,000 hardworking vendors supporting the DoD — be proud and be ready to do your part in helping America’s continued prosperity. 

Read More

Blog Feature

CMMC Cyber and Data Security DFARS GOVFTP Cloud Government Compliance ITAR NIST Supply Chain

Cybersecurity Maturity Model Certification: The CMMC Basics

The United States of America is increasing attention on cybersecurity to ensure the prosperity of the American people. Public and private entities must secure systems, and networks from adversaries with malicious purpose. In this effort to secure Federal networks, one of the areas of focus for the government is the Federal Supply Chain and strengthening the security of United States Government contracting systems. The global nature of the Internet allows all countries to participate in communication, commerce, and free exchange of ideas – allowing for true prosperity. Access to something as powerful as the Internet presents opportunities for outside nations to conduct espionage, steal intellectual properties, cybercrimes, and remotely attack critical infrastructure.

Read More

Blog Feature

Healthcare Compliance

The Impact of COVID-19 on Secure File Transfer in Healthcare

COVID-19 has impacted every industry and person, especially those involved in healthcare. With the influx of patients and the logistical nightmare of securely transferring patient data at the scale it is currently coming in, healthcare organizations are processing data at rates previously unseen.

Read More

Blog Feature

Cyber and Data Security Government Compliance

Why DoD SAFE Replaced AMRDEC SAFE and What It Means for Your Business

AMRDEC SAFE was the leading solution in the government file-sharing space for a long time. However, given the increasing demands of security and file capacity, AMRDEC was replaced with a new solution called DoD SAFE

Read More

Blog Feature

Press Releases

FTP Today Opens Dallas Sales Office

Las Vegas, Nevada U.S.A. June 15, 2020 FTP Today announces the grand opening of its new Sales office in Dallas, Texas as part of its continued growth strategy.   A pioneer of cloud-based Software-as-a-Service (SaaS) for Secure File Transfer, FTP Today offers its web applications to both enterprises and government agencies via two separate and distinct cloud platforms.  FTP Today has been in operation since 1998 with development, support, and sales teams throughout the continental United States.  FTP Today was founded by technology entrepreneur Martin Horan, who started his first technology services business in 1983.

Read More

Blog Feature

FTP Solutions

Secure FTP: Best Alternatives to FTP

FTP (File Transfer Protocol) has been a leading option in file transfers for a long time. However, looking at the complexity of data security compliance standards and the capabilities of data hackers, a stronger and more secure solution can be required. As technology advances (and hackers’ skills advance in parallel), you need the best file transfer option to keep data protected.

Read More

Blog Feature

Cyber and Data Security Government Compliance

3 Reasons ITAR Compliance Is Important For Aerospace Companies

The aerospace industry has grown exponentially in recent memory. The transport of goods and services has become a major player in the global economy. But, with that growth has come increased regulation. In particular, regulations in data and file sharing led to the creation of ITAR, International Traffic in Arms Regulations.

Read More

Blog Feature

FTP Solutions

Why Do People Still Use FTP Sites?

File sharing options and acronyms can often be overwhelming to keep track of as the digital world continues to advance. With so many to choose from – FTP, SFTP, FTPS, HTTPS, EFSS, Collaboration Systems and more – it can be a challenge to distinguish between the options and select the best one for your organization. This is why so many companies default to using FTP (file transfer protocol) – one of the oldest and most basic forms of sharing data via the Internet.

Read More

Blog Feature

FTP Solutions File Sharing Best Practices

A Comparison of Dedicated FTP Servers and Cloud FTP Hosting

When it comes to file sharing, nothing is more important than security. But when there are so many solutions on the market, it can be difficult to determine which option will best meet your needs.

Read More

Blog Feature

Cyber and Data Security File Sharing Best Practices

Cybersecurity Best Practices for Newly Remote Employees

Businesses all over the world are adjusting how employees work due to the coronavirus pandemic. One recent study reported that 90% of IT professionals believe remote workers are not secure. At the same time, over 70% think remote staff poses a greater risk than onsite employees. 

Read More

Blog Feature

Government Compliance

5 Aerospace Cybersecurity Trends for 2020

Aerospace cybersecurity is a growing topic in our industry – and not for the right reasons. With a lack of clear and required regulations, as well as an abundance of data and security risks, aerospace is quickly becoming one of the biggest targets for cybersecurity attacks in the world. 

Read More

Blog Feature

Cyber and Data Security Government Compliance

What is the NAS9933 Aerospace Cybersecurity Standard?

Imagine you are the pilot of a plane, carrying delicate cargo – maybe the most important cargo: human passengers. Suddenly, your plane’s systems are infiltrated by a hacker with nefarious motives and you no longer have GPS or communication connection. Panic begins to set in as you struggle to maintain the safety and security of the aircraft.

Read More

Blog Feature

Cyber and Data Security Government Compliance

The Role of the AIA in Aerospace Cybersecurity

At FTP Today, we get asked a lot about aerospace cybersecurity. From who regulates aerospace to how to be compliant in the industry, it is critical to understand how the industry works. 

Read More

Blog Feature

Government Compliance

What is the Difference Between CMMC and DFARS?

DFARS, or the Defense Federal Acquisition Regulation Supplement, was launched back in 2016 as a government effort to protect from cybersecurity attacks. For DoD contractors, this meant increased regulations and assessments for those working with controlled information. 

Read More

Blog Feature

Government Compliance

4 Steps to Becoming CMMC Compliant

As a DoD contractor, you are probably wondering how to prepare for the cybersecurity maturity model certification. Understanding the Cybersecurity Maturity Model Certification (CMMC) compliance process will help your business maintain security and continue to earn government contracts.

Read More

Blog Feature

Government Compliance

What is the Difference Between CMMC and NIST?

If you are a DoD contractor, this summer you’ll be required to align with new CMMC regulations. With the new regulations coming with the Cybersecurity Maturity Model Certification, many DoD contractors are facing confusion and even frustration at the prospect of integrating a whole new cybersecurity model into their compliance efforts. A big question many in the industry have is how the new CMMC differs from other major regulations in the industry, especially those outlined in NIST publications.

Read More

Blog Feature

Government Compliance

The Levels of Cybersecurity Maturity Model Certification (CMMC)

The Cybersecurity Maturity Model Certification is a relatively new security framework created to help government contractors standardize security controls used to protect CUI  (controlled unclassified information). The Department of Defense plans to migrate to this new level-based certification model starting in June 2020. The CMMC framework is designed to indicate the maturity of a company’s cybersecurity efforts. The more mature your security controls are, the higher the level you will obtain. The ability to handle sensitive data will be dependent on your certification level.  As a provider of government compliant data sharing software solutions, FTP Today plans to study these new regulations to ensure we get the correct certification level so we can provide our users with compliant and up-to-date solutions.

Read More

Blog Feature

Government Compliance

Do DoD Contractors Need the Cybersecurity Maturity Model Certification?

The Cybersecurity Maturity Model Certification (CMMC) was a big announcement for the defense industry, and contractors for the Department of Defense who manage controlled unclassified information need to start preparing for major changes that will come as part of this process.

Read More

Blog Feature

FTP Solutions Government Compliance

Aerospace Cybersecurity Standards Explained

Cybersecurity is a widespread concern, the aerospace industry being no exception. In fact, in 2016 only 40% of aerospace and defense companies said they have a comprehensive set of security policies in place. That’s a surprisingly low number when you consider the major ramifications that could result from a data security breach.  As cybersecurity threats grow more common and more sophisticated, it’s vital that aerospace and defense companies understand the government recommendations in place related to data security and how to comply with those recommendations. 

Read More

Blog Feature

Government Compliance

The 4 Biggest Aerospace Cybersecurity Challenges

The aerospace industry is a particularly alluring target for cybersecurity hackers, which also means that those working in the industry need to be aware of possible threats. Here are four of the biggest and most common cybersecurity challenges faced by the aerospace industry.

Read More

Blog Feature

FTP Solutions Government Compliance

5 Tips for Using the FedRAMP Marketplace

The FedRAMP Marketplace is a helpful resource for federal agencies looking for FedRAMP compliant cloud vendors, products, agencies, assessors, and more. Choosing the best vendors to work with can be a time consuming and stressful process, especially when you don’t know where to begin your search. However, the FedRAMP Marketplace can drastically shorten the length of your search. 

Read More

Blog Feature

Cyber and Data Security Secure File Sharing

Why Use SSH-Key Authentication for SFTP Instead of Password Authentication?

When you think of user access security, you might think of traditional security measures, like submitting your username and password. While these basic security measures may have protected you in the past, they’re not quite strong enough to withstand advanced attacks from today’s hackers.  Thus, many organizations are turning to SSH-key authentication to provide a greater level of security for SFTP solutions compared to traditional password measures. In this article, we’ll look at what SSH-Key Authentication entails, and how this security measure protects your data better than other options. 

Read More

Blog Feature

Government Compliance

What are the Costs of Working with a FedRAMP Authorized CSP?

Working with a FedRAMP Authorized cloud service provider (CSP) is required for federal government agencies. Federal Risk and Authorization Management Program (FedRAMP) was designed to address security vulnerabilities that can arise when working with cloud vendors. As with any business decision, there are benefits and drawbacks that come with working with a FedRAMP Authorized CSP. There are two primary areas in which you’ll benefit and face challenges: FedRAMP cost and time. Let’s look at these two areas of working with a FedRAMP Authorized CSP.

Read More

Blog Feature

Government Compliance

The 3 Stages of FedRAMP Compliance

Many cloud service providers strive to be FedRAMP compliant and earn their FedRAMP authorization. Gaining FedRAMP authorization means that federal government agencies have permission to work with a specific cloud service provider. This provider has demonstrated that they can meet FedRAMP requirements to keep sensitive data protected, making them a suitable service provider for government organizations.  Let’s look at the three stages of FedRAMP compliance and learn more about the process cloud service providers go through to be FedRAMP compliant. We’ll also take a closer look at the benefits of working with cloud service providers who have been through this process and received their FedRAMP authorization.

Read More

Blog Feature

Healthcare Compliance

5 Types of Challenges You Must Overcome to be HIPAA Compliant

If your organization deals with sensitive healthcare data, you’re well aware of the importance of HIPAA compliance. While compliance with the Health Insurance Portability and Accountability Act of 1996 may be time-consuming or complicated, it is definitely essential, regardless of the challenges that come with your compliance efforts.

Read More

Blog Feature

Cyber and Data Security Government Compliance

4 Benefits of Using a FedRAMP Authorized Cloud Service Provider (CSP)

Security breaches and cybersecurity attacks happen every day, making it imperative that organizations have the proper security controls in place. In addition to having your own security measures established and tested, you also need to ensure that every service provider you work with is up to your standards, especially a cloud service provider (CSP). 

Read More

Blog Feature

Cyber and Data Security File Sharing Best Practices

How BYOD Is Affecting Your Business's File Security

No longer just a novel approach to office technology, BYOD (bring your own device) policies have become common practice in today’s workplaces. It’s easy to see why as we grow more dependent on smartphones, tablets, laptops, and other devices by the day. 

Read More

Blog Feature

Cyber and Data Security Government Compliance

The Difference Between ATO and P-ATO FedRAMP Authorization

For so many organizations, especially government agencies, it can feel like compliance requirements are increasing each day. It can be a challenge to keep up with all the necessary requirements Cloud Service Providers must meet. FedRAMP is one such requirement. 

Read More

Blog Feature

Government Compliance

Understanding The Levels of FedRAMP Compliance

Choosing a cloud service provider is a major decision for many organizations, especially when you factor in FedRAMP compliance. Understanding the levels of FedRAMP compliance is imperative for those agencies trying to determine which cloud service provider is right for their needs. 

Read More

Blog Feature

File Sharing Best Practices Healthcare Compliance

How to Be HIPAA Compliant When Sharing Sensitive Files

Is your company subject to HIPAA compliance regulations? If you deal with healthcare data, the answer is yes. Maintaining HIPAA compliance is essential if you want to avoid steep fines, protect your business, and most importantly, protect the sensitive healthcare data belonging to your customers.

Read More

Blog Feature

Government Compliance

An Overview of Regulations Under The DDTC

When you deal with defense-related data and services, the different compliance regulations you’re subject to can be difficult to keep straight. One set of compliance mandates, ITAR, comes from the DDTC. Learn more about the DDTC, its relation to ITAR and USML, and how to maintain compliance. 

Read More

Blog Feature

Government Compliance

Data Security Best Practices for ITAR Compliance

If you’re running a company that’s subject to ITAR compliance regulations, you know how important data security can be. ITAR (International Traffic in Arms Regulations) guidelines are provided by the U.S. government to ensure that sensitive materials don’t fall into the hands of foreign or nefarious parties, and contractors play a big role in aiding the government in its efforts.

Read More

Blog Feature

Cyber and Data Security Government Compliance

6 Steps for Implementing the NIST Cybersecurity Framework

Implementing the NIST Cybersecurity Framework is one of the best ways to mitigate the risk of a data breach in your organization. If you want to keep your sensitive files protected from nefarious parties roaming the net, the best thing to do is to use this framework in your daily operations. Learn more about the NIST Cybersecurity Framework, and how it can help you keep your data protected.

Read More

Blog Feature

Financial Compliance Healthcare Compliance Legal Compliance

Regulatory Compliance: The Differences Between HIPAA, SOX, and GLBA

If you’re subject to regulatory compliance, this can have a major impact on the way your business operates. HIPAA, SOX, and GLBA are three regulatory compliance standards that apply to a wide range of companies. Learn more about these compliance standards, and the steps companies must take to align with them.

Read More

Blog Feature

File Sharing Best Practices

8 Types of Malware Attacks and How to Avoid Them

Malware is a threat to your business both from a monetary and a productivity perspective. It can compromise your secure data and bring your business to a screeching halt. Find out more about malware, eight common types of malware attacks to watch out for, and the steps you can take to mitigate the risks of malware.

Read More

Blog Feature

FTP Solutions

Best Secure File Transfer Solutions? [A Comparison Guide]

Before integrating a secure file sharing solution into your business operations, there’s some groundwork to do. You have to understand a few things about the nature of secure file sharing, and the criteria you should use to evaluate solutions. Here are a few answers to common questions that can help you start the search process.

Read More

Blog Feature

FTP Solutions File Sharing Best Practices

How Does an FTP Server Work and What are Its Benefits?

Using an FTP server is a common solution for businesses that want to keep their data safe. If you’re looking for the right option to maintain data security, a hosted FTP server could be the answer. Learn more about what FTP servers are, how they work, and how they can benefit your business. 

Read More

Blog Feature

Government Compliance

Everything You Need to Know About EAR Regulation Compliance

Is your business subject to commercial Export Administration Regulations or its defense counterpart International Traffic and Arms Regulations? If so, there are some important security measures you should implement to align with these compliance standards. Before you can know how to comply with ITAR and EAR regulation standards, you need to know more about the goals of these regulations, and what they mean for your organization.

Read More

Blog Feature

Government Compliance

The Glossary of DFARS Compliance Terms

Understanding DFARS, its correlating policies and information can be challenging. Explore this glossary of DFARS terms and concepts to have a better understanding of DFARS compliance.

Read More

Blog Feature

FTP Solutions

SFTP vs. FTP: Understanding the Difference

Data is a valuable asset, one that’s important for businesses to protect. Because data is important, it’s vital that businesses put a lot of thought into how data is stored, used, and transferred. Opening data up to transfers via the internet can also mean opening data up to potential breaches and compromises.

Read More

Blog Feature

Government Compliance

The Most Common FAQs on NIST 800-171 and NIST 800-53

NIST 800-171 and NIST 800-53 are two key publications outlining cybersecurity requirements for government agencies, contractors, and subcontractors. However, figuring out how to comply with the guidelines recommended in these long publications from the National Institute of Standards and Technology can be overwhelming. It’s no surprise that many people have questions about what these publications are and what cybersecurity measures they recommend.

Read More

Blog Feature

FTP Solutions

Why an FTP Alternative is Not Ideal for External File Sharing

With numerous options for sharing files, choosing the right one can be a challenge. Maintaining data security is essential, but without the appropriate file sharing process, your data could be at risk. You have to ensure that files are secure when they are shared outside of your organization, but often non-secure methods are used to share with outside entities. Find out more about FTP alternatives, and how they could put your data at risk.

Read More

Blog Feature

FTP Solutions

Overcoming Common File Transfer Protocol Challenges

Does your organization commonly use old methods of FTP (file transfer protocol) to share data? Unfortunately, this mode of data sharing comes with a number of challenges, some of which may be a threat to your business. Learn more about five common challenges companies face when using FTP, and find out how you can overcome these issues.

Read More

Blog Feature

Government Compliance

DoD Contractor Options to Meet DFARS Compliance

Department of Defense contractors are trusted with some of the government’s most sensitive information. As such, these contractors have a unique responsibility to keep that data secure. DFARS (Defense Federal Acquisition Regulation Supplement) is a set of requirements designed DoD contractors must fulfill to keep sensitive data protected.

Read More

Blog Feature

Government Compliance

How Much Will NIST Compliance Cost?

If you are a government contractor, compliance is non-negotiable. Protecting sensitive information the government has entrusted to you comes with a big responsibility – aligning with National Institute of Standards and Technology data security recommendations. If you want your data to be secure and to remain an eligible government contractor, NIST compliance is the first place to start.

Read More

Blog Feature

Government Compliance

Understanding the Basics of FedRAMP Compliance

The Federal Risk and Authorization Management Program (FedRAMP) essentially is a standardized approach to securing online cloud platforms. It’s important to understand what have a thorough understanding of FedRAMP basics to ensure the cloud service providers you choose to work with are following the appropriate laws and regulations.

Read More

Blog Feature

Government Compliance

The Best Resources for NIST Security Compliance

Cybersecurity is vital for modern companies using digital tools. In 2018, the NIST Small Business Cybersecurity Act was passed requiring the National Institute of Standards and Technology to "disseminate, and publish on its website, standard and method resources that small businesses may use voluntarily to help identify, assess, manage, and reduce their cybersecurity risks.” Thus, NIST now offers a wealth of resources to support all businesses as they work to comply with NIST security guidelines.

Read More

Blog Feature

Government Compliance

ITAR Requirements: The Consequences of Non-Compliance

Is your company subject to ITAR (International Traffic in Arms Regulations)? Compliance with these ITAR requirements isn’t optional, and non-compliance could have serious, negative impacts on your company. To mitigate the risk of violating ITAR, you need to learn more about common violations, consequences for those violations, and what to do when a violation occurs.

Read More

Blog Feature

Government Compliance

What is NIST? Understanding Why You Need to Comply

If your business often works with the United States government, you’re likely aware of the importance of compliance. You also know that any sensitive information shared with you by the government is subject to the highest security standards. This sensitive data can often be a target for hackers, so it’s vital that you take cybersecurity measures seriously.

Read More

Blog Feature

Government Compliance

7 Ways to Prepare for DFARS Compliance

As a government contractor, it’s imperative that you take steps to comply with cybersecurity recommendations outlined in the Defense Federal Acquisition Regulation Supplement (DFARS). To adequately prepare for and meet DFARS compliance standards, you first need to learn more about what DFARS entails and the steps you must take to protect government data.

Read More

Blog Feature

FTP Solutions

How to Evaluate if a Cloud-Based FTP Solution is Right for Your Business

Does your organization need a cloud FTP solution? File sharing is a key aspect of many businesses, but unless you have a uniform, secure way to share files, your data could be at risk.

Read More

Blog Feature

Government Compliance

NIST 800-171 Assessment for DoD Contractors and Subcontractors

Conducting  a security assessment is an essential part of keeping your data protected. It’s not just enough to implement security measures; you need to regularly assess the measures you have in place to determine their effectiveness.

Read More

Blog Feature

File Sharing Best Practices

File Sharing Standards Your Team is Failing to Implement

Establishing file sharing standards within your organization creates the necessary security guidelines needed to keep your data protected. However, without the proper file sharing standards in place, your data could be at risk.

Read More

Blog Feature

Government Compliance

AMRDEC SAFE Alternatives for Secure File Sharing

Was your organization a previous user of AMRDEC SAFE (Army Aviation and Missile Research, Development, and Engineering Center - Safe Access File Exchange)? If so, you’ve now been forced to seek out alternative secure file sharing solutions to replace the defunct AMRDEC SAFE. Because AMRDEC SAFE was shut down due to major lapses in security protocols, your organization should find an option that can stand up to the security threats that you face today and ones that you’re sure to face in the future.

Read More

Blog Feature

Government Compliance

Your Complete NIST 800-171 Checklist

If your organization handles controlled unclassified information (CUI), you know how crucial it is to keep that data protected. NIST (National Institute of Standards and Technology) 800-171 was written specifically for organizations like yours to provide guidance on appropriate handling of sensitive data.

Read More

Blog Feature

Government Compliance

NIST 800-171 Questionnaire: Are You Complying With These Access Control Factors?

Are you complying with NIST (National Institute of Standards and Technology) SP 800-171? Because there are so many security controls you must have in place, it can be difficult to determine if you are in total compliance.

Read More

Blog Feature

Government Compliance

14 Questions to Answer on Meeting CUI Security Requirements

Are you looking for clarification on the CUI (Controlled Unclassified Information) security measures recommended in National Institute of Standards and Technology Special Publication (NIST SP) 800-171? These government guidelines can often seem complex, and it can be a challenge to determine the extent to which you have aligned with their policies. Parsing through the business requirements and risk assessments associated with appropriate CUI security protections can be a drain on your time and resources.

Read More

Blog Feature

Government Compliance

NIST Security Controls Assessment Guide

Does your organization have security controls in place, but you’re unsure if they’re effective or align with NIST (National Institute of Standards and Technology) guidelines? NIST Special Publication 800-53 was created by NIST as a benchmark for successful security control assessments.

Read More

Blog Feature

Government Compliance

How to Comply with NIST 800-171

The National Institute of Standards and Technology (NIST) Special Publication 800-171 provides organizations with guides on how to store, share, and protect controlled unclassified information (CUI). To meet NIST 800-171 requirements, there are four areas where you should focus your efforts – access controls, activity monitoring and management, user behaviors, and data security measures. These are the areas where mistakes could open the door for a data breach.

Read More

Blog Feature

Government Compliance

6 Steps to Implement NIST 800-171 Requirements

Has your company taken steps to be compliant with NIST 800-171 regulations? December 31, 2017 was the deadline for companies to be compliant and implement NIST 800-171 requirements. However, many companies may have missed the deadline or have only met some of the compliance requirements, but not all.

Read More

Blog Feature

Government Compliance

2019 ITAR Compliance Regulations You Need to Know

ITAR, or the International Traffic in Arms Regulations, is a set of regulations drafted to ensure the protection of government defense data, including articles and services on the United States Munitions List (USML) and all related technical data. Only companies that have registered with the Directorate of Defense Trade Controls (DDTC) are permitted to import and export defense data. Each year companies are required to renew their registration with DDTC and recommit to maintaining ITAR compliance.

Read More

Blog Feature

FTP Solutions

Complete Breakdown of FTP Hosting Costs – What You Need to Know

When trying to evaluate the cost of FTP hosting providers, there are many factors you need to consider that directly affect the cost. Because companies of different sizes and in different industries have their own unique needs and budgets, many file sharing solution providers offer numerous solution tiers with varying capabilities based on cost. In this article, we’ll explore the different FTP hosting costs associated with each tier offered by a top provider.

Read More

Blog Feature

Government Compliance

FedRAMP vs. FISMA: Similarities and Differences

For federal agencies and the contractors they work with, compliance is a daily objective and concern. With so many compliance regulations – especially ones pertaining to data security – it can be a challenge to keep up with every security control that needs to be implemented and updated.

Read More

Blog Feature

Government Compliance

NIST Cybersecurity Framework Explained

Is your organization working to align with NIST (National Institute of Standards and Technology) Cybersecurity Framework? The objective of the NIST Cybersecurity Framework is to identify “a prioritized, flexible, repeatable, performance-based, and cost-effective approach” to keeping data secure. This includes “information security measures and controls that may be voluntarily adopted by owners and operators of critical infrastructure to help them identify, assess, and manage cyber risks.” To put it simply, the NIST framework is a set of guidelines to help you protect sensitive government data.

Read More

Blog Feature

Government Compliance

FISMA Compliance Requirements for File Sharing

In 2002, the United States government took steps to address a relatively new and growing concern – data security in the 21st century. The passage of The E-Government Act (Public Law 107-347) brought security into the internet age, and as a result, FISMA was created. FISMA, or Federal Information Security Management Act, was drafted in 2003 and later updated in 2014 to the Federal Information Security Modernization Act. If you’re subject to FISMA requirements, you may be wondering what steps you should take to comply with these regulations. Continue reading to learn more about FISMA compliance and the actions you can take to align with the standards.

Read More

Blog Feature

NIST File Sharing Standards: What You Need to Know

NIST standards are vital for both federal and nonfederal organizations alike. These guidelines were designed as a set of best practices that, when applied to your data storage and sharing practices, can help you prevent a security breach. Learn more about the basics of NIST standards, how these standards are created, and the value of using the best practices in your own file sharing processes.

Read More

Blog Feature

Government Compliance

Protecting Controlled Unclassified Information: NIST 800-171

The U.S. government is reliant on contractors and subcontractors for special projects. As such, unclassified defense information, or Controlled Unclassified Information (CUI), is often shared with these partners. Though this information is not classified, it will still be sensitive information that should only be accessed by approved parties. This is where NIST (National Institute of Standards and Technology) 800-171 comes in. These are a set of guidelines for secure handling of CUI, especially as it pertains to where this information is stored. Contractors may not use federal data storage systems, but it’s still essential that the solutions they do use align with NIST standards.

Read More

Blog Feature

Government Compliance

DFARS Compliance: Steps to Consider for FTP Hosting Services

Does your organization need to comply with DFARS (Defense Federal Acquisition Regulation Supplement) regulations? The objective of DFARS is to prevent the United States military from being too dependent on raw materials from foreign countries. And complying with these regulations can seem like a major burden, especially when you’re trying to select contractors and subcontractors.

Read More

Blog Feature

Government Compliance

How Cloud-Based File Sharing Fits in the CJIS Compliant Security Policy

Maintaining CJIS (Criminal Justice Information Services) compliance might seem like a heavy burden for some law enforcement organizations. But with the right tools in place – like  cloud-based file sharing – you can turn your attention from compliance back to your job.

Read More

Blog Feature

Government Compliance

What Is CJIS Compliance?

Criminal Justice Information Services (CJIS) protects private or sensitive information gathered by local, state, and federal law enforcement agencies. This could include fingerprints, criminal background information, copies of private documents, or anything else that could be classified as sensitive.

Read More

Blog Feature

Government Compliance

ITAR Requirements for Your Employees: Who's at Risk?

ITAR (International Traffic in Arms Regulations) compliance isn’t just an initiative that’s only a concern for those at the top. Every employee plays a role in protecting your data. And, it’s imperative that you know which employees are approved to handle ITAR-related materials. To ensure you’re meeting ITAR requirements for your employees, learn more about how ITAR applies to the people in your company.

Read More

Blog Feature

Government Compliance

What Are ITAR Certification Requirements?

Many people in your industry or others impacted by ITAR (International Traffic in Arms Regulations) are probably asking themselves, “Do we really need to be ITAR compliant?” or “Do we need ITAR certification?” Explore this article on how to be ITAR compliant and what ITAR certification means for your company.

Read More

Blog Feature

Government Compliance

How to Keep Your File Sharing DDTC and ITAR Compliant

Do you believe your products or data are subject to ITAR or DDTC compliance, but you’re unsure how to align with these regulations? Before you can start aligning with compliance standards, you need to know how to conduct ITAR business in alignment with DDTC controls. Explore this article on how to keep your file sharing practices DDTC and ITAR compliant, and learn how the right secure file sharing solution helps you avoid the risks of noncompliance.

Read More

Blog Feature

Government Compliance

Secure AMDEC Safe Alternatives

The United States government has shut down AMRDEC SAFE (Army Aviation and Missile Research, Development, and Engineering Center - Safe Access File Exchange) due to major security concerns with the service. SAFE enabled government agencies and contractors to securely share large files with approved parties. However, outside organizations identified major security risks with the service, and it is currently unclear if SAFE will be reinstated.

Read More

Blog Feature

Government Compliance

ITAR vs. EAR: What You Need to Know When Sharing Files

Is your business subject to ITAR or EAR regulations? If you’re unsure, it’s essential that you find out – fast. Otherwise, you could face serious consequences for noncompliance. To find out which regulations your business is subject to, explore what ITAR and EAR cover and how a file sharing solution can make compliance easier.

Read More

Blog Feature

FTP Solutions

File Sharing Q&A: What Are File Sharing Alternatives?

Have you been tasked with finding a new file sharing alternative for your company? While you’re the expert in your business, you may not have expert knowledge about file sharing alternatives, or how to choose the right option. Don’t worry. There are experts in this field who can answer some of the complex questions that come with adopting a file sharing solution. And, when you know more about your options, you’ll be equipped to make the right decision. For more insight, explore these answers to some common questions about file sharing alternatives.

Read More

Blog Feature

Government Compliance

ITAR Compliance: How Does File Sharing Software Comply with Transmission of Data Standards?

ITAR (International Traffic in Arms Regulations) is a set of government regulations designed to control the export and import of defense-related articles and services. These regulations, which impact a wide range of companies, are in place to ensure that regulated technical data – both physical and digital – is only used by U.S. persons employed by the government or a government contractor. This protected data is outlined in the United States Munitions List (USML), and the goal is to keep these potentially dangerous products out of the hands of civilians, enemies of the government, or possible criminals.

Read More

Blog Feature

FTP Solutions File Sharing Best Practices

Explicit FTPS vs. Implicit FTPS: What You Need to Know

File sharing solutions can be a great asset for you company, but sometimes it can be hard to find the right balance between a solution that’s secure and a solution that’s easy to use. When you find a file sharing option that meets both of those needs, you can increase productivity by making data sharing processes both simple and uniform. You can also keep you data protected, safe from hackers with sinister motives. One file sharing method that might be ideal for your company is FTPS. FTPS builds off the simplicity of the traditional FTP data transfers and adds a needed layer of security to keep data protected from prying eyes. In this article, you’ll learn more about how FTPS works and how it protects your sensitive files. You’ll also explore the differences between the types of FTPS you can use – explicit vs. implicit FTPS.

Read More

Blog Feature

FTP Solutions File Sharing Best Practices

How Do I Know Which File Sharing Solution is Right for Me?

With so many file sharing solutions on the market, it can be hard to determine which option can meet all your company’s needs. The best way to evaluate a solution is by asking yourself what you need from the file sharing solution, outlining your goals, and trying it out for yourself. Learn a little bit more about how to choose the right file sharing solution for your company.

Read More

Blog Feature

Cyber and Data Security

What is the Biggest Cybersecurity or Data Threat?

If you’ve tuned into or read the news lately, you’ve probably seen a story about a data breach or a hacker gaining access to sensitive data. For companies that use sensitive data, cyber attacks should be a huge concern for your team, and something you’re actively striving to prevent. Here are four of the biggest cybersecurity threats your company might be up against, and find out what steps you can take to prevent these types of data breaches in the future.

Read More

Blog Feature

FTP Solutions

What is the Most Cost-Effective File Sharing Solution?

For most businesses, budget is a huge factor in every decision, including choosing a file sharing solution. Are you looking for a cost-effective solution to help you better manage, share, and secure your files? Before you go with the cheapest option, there are a few things you should know. In this article, we’ll compare three file sharing solution options, the costs associated with each, and how to determine which one is right for your business need.

Read More

Blog Feature

Cyber and Data Security

Actions and Procedures to Consider When Establishing a Data Security Policy

Does your company have a working and enforced data security policy? While you may have a few rules that you try to enforce here and there, it can be difficult to keep data safe without a comprehensive and coherent data security policy. As you’re coming up with the data security policy for your company, it’s important to keep a few key actions and procedures in mind. Explore the following actions and procedures that should be incorporated into your data security policy.

Read More

Blog Feature

The Cloud

File Sharing Gone Wrong: What You Need to Know About Disaster Recovery

Have you ever accidentally deleted an important file? Maybe the power went out right as you were about to save something. When it came back on, all your hard work was lost. On a personal level, lost data is a nuisance. On a company-wide scale, lost data can be a huge problem. Disaster recover is an important file sharing solution feature that is easy to overlook. You might be more worried about solution price and data security, forgetting to ask about disaster recovery in your selection process. However, disaster recovery plays a vital role in maintaining productive operations, with your backups essentially working as an insurance policy against lost data.

Read More

Blog Feature

FTP Solutions

Top 6 Questions to Ask When Comparing Corporate FTP Solutions

Adopting a new file sharing solution can be a big investment for your company, both from a time and monetary standpoint. So, before you take the leap, you need to be sure you’re choosing the right option. As you evaluate all of the corporate FTP solutions on the market, it can be hard to tell how they differ. If every solution claims to be the best option, how can you choose the one that’s actually right for your company? Use the following questions to help you differentiate between the various corporate FTP solutions. The FTP providers’ answers to these questions will give you insight into which solution is best.

Read More

Blog Feature

Articles

Restriction Protocols You Need for Compliant File Sharing

Do you live in fear of a getting hit with non-compliance fine? If so, you’re not alone. Many business owners know the risks associated with failing to comply with applicable government regulations, like HIPAA, ITAR, PCI-DSS, GLBA, or SOX. And you know how easily government fines could put your company at risk, especially since they can skyrocket to thousands or even millions of dollars; amounts that many companies are unable to pay out of pocket. This doesn’t even include the potential for lost business, damage to your reputation, or in the most negligent of cases, jail time.

Read More

Blog Feature

FTP Solutions

The Biggest Disadvantages and Advantages of FTP

Whether you’re running a law firm that needs to send large amounts of case data internally or you work at a healthcare company that needs a secure way to share patient data, file transfers are a big part of your daily work activities. But, choosing the best methods for file transfers isn’t easy. There are a lot of options out there, from simply emailing files to coworkers or clients to using a more sophisticated methods like FTP (file transfer protocol). FTP, like any other solution has drawbacks and benefits, so it’s important that you understand FTP fully before making your decision.

Read More

Blog Feature

Articles

When to Use SFTP

Do you need to transfer a file, but you’re unsure of the best way to share it with the intended recipient? While you may have an understanding of the difference between FTP and SFTP, it can be tricky to apply that knowledge to your real-world file transfers and choosing a file transfer solution. You might be asking yourself when to use FTP, when to use SFTP, or if there’s really a difference at all. Continue reading to learn when to use SFTP and how using this option helps your business.

Read More

Blog Feature

File Sharing Best Practices

Best Practices for SFTP Email Notifications

If you’ve been searching for the right SFTP solution for your business, you’ve probably been looking at important features like price, number of users supported, disaster recovery processes, and more. But, one essential SFTP feature you may have overlooked is email alert configuration. Before you choose a top SFTP provider, it’s important that you know how this feature impacts your file sharing processes.

Read More

Blog Feature

Articles

How to Choose the Right FTP Host

Choosing the right FTP host is a tall task for any business. When you started the search process, you probably realized how many options there were to choose from.

Read More

Blog Feature

Articles

What is SFTP Hosting?

 FTP, SFTP, SSL, SSH. With so many acronyms, it’s hard to keep these protocols straight and differentiate between all the different options. SFTP is a wise choice for companies that need to keep data secure, but many people don’t know what SFTP means.

Read More

Blog Feature

Articles

How to Get Budget Approval for a Hosted FTP Solution

All businesses look for ways to save time and money without compromising quality or security for their customers. But most aren’t willing to rock the boat if their current solutions are just good enough to get by. With every transition, concerns about cost and lost productivity arise. And while you might recognize the need for a new FTP solution, you might be concerned that your company’s decision makers won’t be on board with the move. However, it is possible to change the perception of a CEO or decision maker who believes a hosted FTP solution can’t benefit their business and offer a high enough the ROI to justify the investment. You just need the right talking points to convince them.

Read More

Blog Feature

Articles

How Remote Work Affects IT Compliance and Data Security

Hiring remote employees is the easiest way to expand your talent pool, provide a perk your employees are sure to appreciate, and possibly increase security risks. If you don’t properly prepare to offer this perk or choose the right solutions, the data security risks could outweigh the benefits.

Read More