x Close

Take a Tour

Secure File Sharing Blog

B2B File Sharing Blog

Secure file sharing software information, file sharing trends and announcements.

Blog Feature

CMMC Cyber and Data Security DFARS EAR FTP Solutions GOVFTP Cloud Government Compliance ITAR NIST Secure File Sharing The Cloud

How to Plan for Changes to CMMC Requirements

By now, all contractors that work with the U.S. Department of Defense should be fully aware of the Cybersecurity Maturity Model Certification (CMMC) 2.0 announcement from November 2021. The CMMC 2.0 announcement included updates to CMMC 1.0 that were designed to enhance cybersecurity protections for all entities in the defense industrial base, or DIB, and also streamline protections for contractors already utilizing the NIST 800-171 framework. While the announcement of last November did provide a glimpse at what the DOD’s requirements might be in the future, Congress has yet to codify those requirements into a law to be followed. Unfortunately, that leaves contractors and others in the DIB in a limbo period where they know that new CMMC requirements are coming — but they don’t know exactly what those requirements will be. We’ve written previously about the proposed CMMC 2.0 framework and what it might require of contractors. Now we’ll address what contractors and others in the DIB can be doing right now during this limbo period to set their organizations up for future success under CMMC 2.0 once codified by law. While there’s a lot of confusion about what can be done presently, it’s best for DIB members to focus first on Level 1 requirements as outlined by the CMMC 2.0 announcement late last year. The following 17 specific practices are required for Level 1 compliance. They represent basic security hygiene that you can implement for your organization: limiting physical access to your facility and systems, securing storage and transport of data, and monitoring your systems usage are good places to start. Also, note that Level 1 compliance is the basis for Level 2 compliance.

Read More

Blog Feature

Compliance Cyber and Data Security EAR FTP Solutions GOVFTP Cloud Government Compliance ITAR NIST Secure File Sharing

Everything You Need to Know About Aerospace Industry Regulations and Cybersecurity

The aerospace industry is a big business — and it’s only going to get bigger in the coming years. In 2020, the global aerospace industry reached $298 billion. That figure is expected to grow to $430.9 billion by 2025 (an expected 45% increase in 5 years). The size of the industry and it’s expected growth is even more impressive when you consider the many aerospace industry regulations that companies must adhere to. The challenge with operating in aerospace is that almost everything designed, built or created has defense-related implications. Indeed, trade organizations (like the Aerospace Industries Association) and the U.S. government have established stringent regulations and security frameworks to prevent the aerospace industry’s products and data from falling into the wrong hands. These regulations can be burdensome for aerospace companies. But they can also represent an opportunity for aerospace companies to put into place the right tools and technologies for making compliance easier and more automated. Here’s a look at the most relevant aerospace and defense industry regulations — the AIA’s NAS9933, NIST SP 800-171, ITAR and EAR — plus a rundown of how aerospace companies can benefit from compliance.

Read More
Secure File Sharing

Get the answers to your secure file sharing questions!

Are you trying to select a new file sharing solution, but you have a few questions first? Explore these common questions about file sharing solutions and find out their answers.

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance SOC Secure File Sharing The Cloud

What is SOC 2? Why it’s Important to Your Organization

In the modern age, cybersecurity has become a serious priority for organizations operating in both the public and private sectors. Government entities prioritize cybersecurity to prevent foreign actors and third parties from accessing state secrets. Corporations and other businesses prioritize cybersecurity to prevent ransomware, the loss of proprietary information and trade secrets, and generally to secure any information and files they store and share. What is SOC 2 and where does it fit within the emerging cybersecurity universe that’s growing more important with each passing year? SOC, an acronym for “System and Organization Controls,” is a cybersecurity risk management reporting framework that includes different levels for different types of organizations — SOC 2 is the second level of the framework designed for service providers. The SOC framework and SOC 2 requirements for service providers have become a universally accepted standard for securing information, data and files. At FTP Today, we are SOC 2 certified with the GOVFTP Cloud in scope. This is one of the best ways to ensure we’re securing our users’ data and files while minimizing the risk of outside threats. See below for more details on the SOC framework, on SOC 2 compliance, plus what it means for your organization.

Read More

Blog Feature

Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Secure File Sharing The Cloud

Why Rent A Dedicated FTP Server?

The need for an FTP hosting service becomes apparent to any organization that handles, stores or shares sensitive files. Once your organization recognizes the need for an FTP hosting service, and once it realizes in-house solutions are cost-prohibitive, it’s time to answer this question: Should you rent a shared or dedicated FTP server? No two organizations are exactly alike, so this question must be answered on a case-by-case basis. Dedicated FTP servers provide a number of benefits that your organization may want to take advantage of. Here’s a look at the 4 primary benefits of choosing to rent a dedicated FTP server rather than using shared FTP infrastructure.

Read More

Blog Feature

Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Latest Features Secure File Sharing The Cloud

Introducing Our User Facing Clickwrap Agreement Feature

FTP Today recently launched our new User Facing Clickwrap Agreement feature (also known in the industry as a clickthrough agreement). The FTP Today clickwrap agreement feature is only available on our advanced plans. If you are not currently an FTP Today customer and are interested in learning more about our plans and pricing, contact an FTP Today expert to learn more.  If your subscription plan has this feature, you now have the ability to enable and configure clickwrap agreements that force all users to explicitly acknowledge custom terms and conditions before logging in to your FTP Today account. The initial launch of FTP Today clickwrap agreements is just the first step. In the future, we anticipate offering different types of clickwrap agreements for different types of users — for example, a clickwrap agreement for internal users plus a separate clickwrap agreement for external users. Clickwrap agreements have become essential tools for businesses that operate online in any capacity. At FTP Today, we’re constantly adding new features and tools that empower organizations to protect their files, data and information, as well as empower organizations to protect themselves from liability. Continue reading to learn more about our clickwrap user agreement feature and how administrators can configure a clickwrap agreement within FTP Today. If you have questions or would like to see a demo of our clickwrap agreements, get in touch with us.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance NIST Secure File Sharing The Cloud

NIST 101: Everything You Need to Know About the NIST Framework

Even if you’ve only dabbled in cybersecurity, you’ve likely heard the acronym NIST — which stands for National Institute of Standards and Technology. Behind that simple acronym are huge implications for organizations that experience cybersecurity threats or that regularly handle sensitive files and information. The NIST framework for cybersecurity can help keep your organization safe from breaches, and it can also help you achieve compliance so that you can work with other organizations and government agencies that are concerned about cybersecurity. To help you better understand the NIST framework for cybersecurity, here are in-depth details about NIST and specific publications relevant to cybersecurity and the protection of sensitive files and information.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Latest Features Secure File Sharing The Cloud

Introducing Our Session Lockouts Feature — for a More Secure FTP

In mid-November, FTP Today launched a new session lockout feature that will create a more secure FTP hosting experience for our users. This new feature slows down and defeats cyber-attacks, and it’s also a key component to complying with certain cybersecurity regulations and standards. Sessions lockouts are available through three of FTP Today’s pricing plans: Premium, Ultimate and Dedicated Server. To start taking advantage of this new feature, sign into your administrator dashboard and click on the Account Lockout Policy tab on the left. Visiting this tab will give you the opportunity to configure session lockout settings by IP address and username. You can enable or disable the feature, set the number of login failures that will trigger a lockout, adjust the tracking window minutes, and change the number of lockout minutes. See below for more details on the benefits of session lockouts, as well as more information on taking advantage of and customizing session lockouts for your organization. As always, our team is here to help if you have any questions or would like to further discuss session lockouts.

Read More

Blog Feature

CMMC Compliance Cyber and Data Security DFARS EAR FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance ITAR NIST PCI Secure File Sharing The Cloud

Data Encryption Best Practices

File transfer protocol (FTP) as it was first conceived included no encryption. In the earliest days of FTP, senders and recipients of files logged in with usernames and passwords in plain text, and files were passed from one party to another without encryption. That’s not the case with modern FTP providers. They apply modern data encryption best practices to FTP transactions so that file transfers are conducted with the utmost security. What data encryption best practices should you be following? Here’s a look at different types of encryption, encryption needed for secure file transfers, plus details on how FTP Today handles encryption for its clients.

Read More

Blog Feature

CMMC Compliance Cyber and Data Security DFARS EAR FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance ITAR NIST PCI Secure File Sharing The Cloud

CMMC 2.0: How the DoD’s Cybersecurity Certification is Changing

The body that oversees Cybersecurity Maturity Model Certification (better known as CMMC) has just announced version 2.0 of its standards. This updated version of CMMC is significant for organizations that are part of the defense industrial base — organizations numbering 300,000-plus that comprise the supply chain for defense-related projects in the United States. See below for more details on CMMC 2.0, plus what those changes mean for organizations that work on projects with the U.S. Department of Defense.

Read More

Blog Feature

Compliance Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Secure File Sharing The Cloud

8 SFTP Best Practices for Your Business

You’ve likely heard of FTP as a protocol for sharing files and information across the Internet. You may have also heard of SFTP, but what exactly is the difference? Below, you’ll find details on the differences between FTP and SFTP, plus the reasons why SFTP is the most secure way to share sensitive information outside your organization. To make sure you’re maximizing your use of SFTP hosting, we’ve also included a comprehensive list of SFTP best practices. Want to learn more about SFTP cloud server options, use of SFTP, SFTP cost, and general SFTP cloud solutions? Our team is always here to help. Contact us to chat with an SFTP expert.

Read More