File transfer protocol has been around for decades. But FTP as originally conceived was not necessarily a secure way to transfer files between two parties. Things are different today. Organizations that need a secure protocol for transferring files have access to plenty of FTP alternatives that can get the job done. In this post, we will walk through your secure FTP alternatives, and we will also provide guidance on how to set up a secure FTP system for your business. If you have any questions about secure FTP, you can always reach out to us to learn more.
Cybersecurity threats exist all around us, no matter what industries we may work in. The organizations that emphasize computer security best practices are the ones that will succeed at preventing threats from becoming realities. Training in computer security isn’t always handled properly, though. To ensure that your organization is staying safe from cybersecurity threats, here’s a look at computer security best practices for fighting internal and external threats, as well as best practices for keeping data safe from former employees.
Are you trying to select a new file sharing solution, but you have a few questions first? Explore these common questions about file sharing solutions and find out their answers.
By now, all contractors that work with the U.S. Department of Defense should be fully aware of the Cybersecurity Maturity Model Certification (CMMC) 2.0 announcement from November 2021. The CMMC 2.0 announcement included updates to CMMC 1.0 that were designed to enhance cybersecurity protections for all entities in the defense industrial base, or DIB, and also streamline protections for contractors already utilizing the NIST 800-171 framework. While the announcement of last November did provide a glimpse at what the DOD’s requirements might be in the future, Congress has yet to codify those requirements into a law to be followed. Unfortunately, that leaves contractors and others in the DIB in a limbo period where they know that new CMMC requirements are coming — but they don’t know exactly what those requirements will be. We’ve written previously about the proposed CMMC 2.0 framework and what it might require of contractors. Now we’ll address what contractors and others in the DIB can be doing right now during this limbo period to set their organizations up for future success under CMMC 2.0 once codified by law. While there’s a lot of confusion about what can be done presently, it’s best for DIB members to focus first on Level 1 requirements as outlined by the CMMC 2.0 announcement late last year. The following 17 specific practices are required for Level 1 compliance. They represent basic security hygiene that you can implement for your organization: limiting physical access to your facility and systems, securing storage and transport of data, and monitoring your systems usage are good places to start. Also, note that Level 1 compliance is the basis for Level 2 compliance.
Large enterprises operating in the cloud need compliant and secure environments for transferring sensitive files: files that include personal information, proprietary information, HIPPA-protected information, information related to national defense, plus more. These large corporations might have the expertise, but typically don’t have the time needed to build and secure their own file-sharing systems. In-house team members are typically being pulled in a multitude of directions by other business units, which is what makes enterprise FTP solutions and platforms so attractive. Enterprise FTP solutions can provide the high number of concurrent connections, plentiful user licenses and large amounts of storage that large businesses require. What specifically should you be looking for in enterprise FTP solutions? Here's a 7-point checklist of must-haves for large companies exploring file transfer solutions.
FTP, also known as file transfer protocol, is a process that organizations can use to transfer large and/or sensitive files from one location to another. Secure “versions” (or alternatives) of FTP (SFTP, FTPS) are especially useful in the defense, legal, healthcare, manufacturing, and finance industries. However, FTP generally speaking, is used in almost every industry where the sharing of information is necessary. But what is FTP exactly? At FTP today, we have a team of dedicated secure file transfer experts who are always available to talk about your organization and its file transfer needs. Continue reading for a deep dive into FTP, and contact us if you would like to schedule a time to discuss FTP and what it could mean for your business.
Corporate servers are loaded with sensitive information. If this information falls into the wrong hands, it could lead to regulatory violations, breach-related liability and even embarrassing headlines. An ecosystem of frameworks and protocols has grown out of the need for secure data storage and sharing. FTPS is one of those protocols used to protect data in transit. But how does FTPS work? And what makes it different from other file-sharing protocols? We’ll address those questions and others below. Continue reading to learn more about your options for secure file storage and sharing, and get in touch with the FTP Today team to ask questions or talk about your organization’s specific file-sharing needs.
In late summer 1996, the President of the United States signed into law the Health Insurance Portability and Accountability Act. This law today is better known by its acronym — HIPAA. HIPAA is designed to protect the private and personal information of healthcare patients, including “diagnosis, treatment information, medical test results, and prescription information.” While HIPAA is no doubt an essential law for protecting patients and their health-related information, it does create a burden for companies and other organizations that store and transfer files that contain HIPAA-protected information. See below for more information on HIPAA-compliant online file sharing.
All organizations store and share files and data that are sensitive on some level. Health care is the No. 1 industry for storing and sharing sensitive files, followed closely by the legal industry — which makes secure file sharing for law firms a priority that too often goes overlooked. The volume of sensitive information handled by law firms, this includes both corporate information and sensitive data related to tax returns, makes the legal industry a major target for hackers. This calls for strict policies around how that information can be stored and shared digitally. Bloomberg reports that more than 80% of the top 1,000 law firms in the world had sustained a recent data breach. That’s bad news for firms – and their clients. Breaches can be costly, not just because of ransomware payouts but also due to the damage to a company's reputation that emerges from a breach. The good news is that tools exist to make secure file sharing for law firms a reality.
The aerospace industry is a big business — and it’s only going to get bigger in the coming years. In 2020, the global aerospace industry reached $298 billion. That figure is expected to grow to $430.9 billion by 2025 (an expected 45% increase in 5 years). The size of the industry and it’s expected growth is even more impressive when you consider the many aerospace industry regulations that companies must adhere to. The challenge with operating in aerospace is that almost everything designed, built or created has defense-related implications. Indeed, trade organizations (like the Aerospace Industries Association) and the U.S. government have established stringent regulations and security frameworks to prevent the aerospace industry’s products and data from falling into the wrong hands. These regulations can be burdensome for aerospace companies. But they can also represent an opportunity for aerospace companies to put into place the right tools and technologies for making compliance easier and more automated. Here’s a look at the most relevant aerospace and defense industry regulations — the AIA’s NAS9933, NIST SP 800-171, ITAR and EAR — plus a rundown of how aerospace companies can benefit from compliance.
In the modern age, cybersecurity has become a serious priority for organizations operating in both the public and private sectors. Government entities prioritize cybersecurity to prevent foreign actors and third parties from accessing state secrets. Corporations and other businesses prioritize cybersecurity to prevent ransomware, the loss of proprietary information and trade secrets, and generally to secure any information and files they store and share. What is SOC 2 and where does it fit within the emerging cybersecurity universe that’s growing more important with each passing year? SOC, an acronym for “System and Organization Controls,” is a cybersecurity risk management reporting framework that includes different levels for different types of organizations — SOC 2 is the second level of the framework designed for service providers. The SOC framework and SOC 2 requirements for service providers have become a universally accepted standard for securing information, data and files. At FTP Today, we are SOC 2 certified with the GOVFTP Cloud in scope. This is one of the best ways to ensure we’re securing our users’ data and files while minimizing the risk of outside threats. See below for more details on the SOC framework, on SOC 2 compliance, plus what it means for your organization.