Over the last month we have written several pieces of content reviewing the differences in the infrastructure, software, and categories of file sharing/file transfer solutions. This blog will be the last installment of this series. In this blog we deep dive into some of the largest security breaches in the file transfer/file sharing industry, the consequences and how to avoid falling victim to a cybersecurity attack. One of the largest growing security threats in business today is data and information security. Protecting your organizations files and other important data from hackers is crucial to business operations. Unfortunately, the damaging effects of a data breach have impacted some of the largest companies in the world like Accellion, AWS, Morgan Stanley, CVS, Wegmans, Microsoft, Facebook, HubSpot and more. On the surface, many of these organizations seemed like they would be impenetrable. The size or nature of your business does not matter. It is more important than ever to protect your information from hackers – specifically enterprise data such as personal identifiable information (PII), personal healthcare information (PHI), payment information, or covered unclassified information (CUI). It is crucial to understand that how this data is sent or shared, stored and received is any organizations biggest threat.
Since the beginning of the internet, it’s been necessary for organizations to transfer data from one location to another for processing, to store it for a future purpose, or to share the information with others. The 1’s and 0’s that makeup the data today are the same as when the internet first launched in 1984. But what’s changed? The answer (as you intuitively may have guessed) is almost everything else. As Plato said: “necessity is the mother of invention,” and as we began transferring more and more information around the globe and into our homes and offices, we needed larger, faster networks, and increasingly advanced platforms to accomplish this. We curated this high-level overview to provide a full picture of the infrastructure solutions that exist in the market today and the advantages and risks of each.
Are you trying to select a new file sharing solution, but you have a few questions first? Explore these common questions about file sharing solutions and find out their answers.
Cybersecurity threats exist all around us, no matter what industries we may work in. The organizations that emphasize computer security best practices are the ones that will succeed at preventing threats from becoming realities. Training in computer security isn’t always handled properly, though. To ensure that your organization is staying safe from cybersecurity threats, here’s a look at computer security best practices for fighting internal and external threats, as well as best practices for keeping data safe from former employees.
FTP, also known as file transfer protocol, is a process that organizations can use to transfer large and/or sensitive files from one location to another. Secure “versions” (or alternatives) of FTP (SFTP, FTPS) are especially useful in the defense, legal, healthcare, manufacturing, and finance industries. However, FTP generally speaking, is used in almost every industry where the sharing of information is necessary. But what is FTP exactly? At FTP today, we have a team of dedicated secure file transfer experts who are always available to talk about your organization and its file transfer needs. Continue reading for a deep dive into FTP, and contact us if you would like to schedule a time to discuss FTP and what it could mean for your business.
In late summer 1996, the President of the United States signed into law the Health Insurance Portability and Accountability Act. This law today is better known by its acronym — HIPAA. HIPAA is designed to protect the private and personal information of healthcare patients, including “diagnosis, treatment information, medical test results, and prescription information.” While HIPAA is no doubt an essential law for protecting patients and their health-related information, it does create a burden for companies and other organizations that store and transfer files that contain HIPAA-protected information. See below for more information on HIPAA-compliant online file sharing.
All organizations store and share files and data that are sensitive on some level. Health care is the No. 1 industry for storing and sharing sensitive files, followed closely by the legal industry — which makes secure file sharing for law firms a priority that too often goes overlooked. The volume of sensitive information handled by law firms, this includes both corporate information and sensitive data related to tax returns, makes the legal industry a major target for hackers. This calls for strict policies around how that information can be stored and shared digitally. Bloomberg reports that more than 80% of the top 1,000 law firms in the world had sustained a recent data breach. That’s bad news for firms – and their clients. Breaches can be costly, not just because of ransomware payouts but also due to the damage to a company's reputation that emerges from a breach. The good news is that tools exist to make secure file sharing for law firms a reality.
FTP Today recently launched our new User Facing Clickwrap Agreement feature (also known in the industry as a clickthrough agreement). The FTP Today clickwrap agreement feature is only available on our advanced plans. If you are not currently an FTP Today customer and are interested in learning more about our plans and pricing, contact an FTP Today expert to learn more. If your subscription plan has this feature, you now have the ability to enable and configure clickwrap agreements that force all users to explicitly acknowledge custom terms and conditions before logging in to your FTP Today account. The initial launch of FTP Today clickwrap agreements is just the first step. In the future, we anticipate offering different types of clickwrap agreements for different types of users — for example, a clickwrap agreement for internal users plus a separate clickwrap agreement for external users. Clickwrap agreements have become essential tools for businesses that operate online in any capacity. At FTP Today, we’re constantly adding new features and tools that empower organizations to protect their files, data and information, as well as empower organizations to protect themselves from liability. Continue reading to learn more about our clickwrap user agreement feature and how administrators can configure a clickwrap agreement within FTP Today. If you have questions or would like to see a demo of our clickwrap agreements, get in touch with us.
File transfer protocol (FTP) as it was first conceived included no encryption. In the earliest days of FTP, senders and recipients of files logged in with usernames and passwords in plain text, and files were passed from one party to another without encryption. That’s not the case with modern FTP providers. They apply modern data encryption best practices to FTP transactions so that file transfers are conducted with the utmost security. What data encryption best practices should you be following? Here’s a look at different types of encryption, encryption needed for secure file transfers, plus details on how FTP Today handles encryption for its clients.
You’ve likely heard of FTP as a protocol for sharing files and information across the Internet. You may have also heard of SFTP, but what exactly is the difference? Below, you’ll find details on the differences between FTP and SFTP, plus the reasons why SFTP is the most secure way to share sensitive information outside your organization. To make sure you’re maximizing your use of SFTP hosting, we’ve also included a comprehensive list of SFTP best practices. Want to learn more about SFTP cloud server options, use of SFTP, SFTP cost, and general SFTP cloud solutions? Our team is always here to help. Contact us to chat with an SFTP expert.
Cybercrime has skyrocketed in the last 18 months. Malware, phishing and other tactics are widely known, and IT teams go to great lengths to protect their organizations from these attacks. But companies that aren’t following file share best practices could also be at risk.