File Transfers Can Be The Weakest Link

Sending files used to be easy, just a matter of attaching them to an email, but as files are getting bigger, and anything over 20MBs is likely to be rejected, people have moved to using more complex, web-based, sharing platforms. These methods are often complicated, and most are not wholly secure.

Files reside anywhere in the world and are accessible by unknown people. They are regularly uploaded and then forgotten, left dormant on an unknown server. File transfers need to be easy, quick and most of all, safe.

The big challenge today is getting back to a simpler way of transferring files via email but it requires more than just a traditional email gateway solution to protect businesses and their people from malicious actors.

As email threats evolve and multiply worldwide, demand for email security protection increases. Common email threats include phishing, business email compromise (BEC) and malware attacks, with phishing being the cause of 84% of cybersecurity data breaches.  As human error or inaction lies at the heart of a breach, a deep understanding of human behaviour is the key consideration in protecting companies and employees from attacks. CTOs must look for the right tools, specifically to suit the needs of their businesses and employees, rather than buying ‘off the peg’.

File-sharing based phishing attacks have skyrocketed over the last year, exploiting the most commonly used webmail and sharing platforms and because they have recognisable brand names, they are not always treated as threats. Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware. A file-sharing phishing attack is a unique type of phishing threat in which a cyber-criminal poses as a known colleague and uses a familiar file-hosting solution to send a target a malicious email containing a link to what appears to be a shared file or document. Clicking on the link can result in infecting the device with malware or stealing login information.

Another common security threat with file transfers is that the data being transferred is often highly confidential in nature. Examples include sending briefing notes and slides to an external agency partner or client on new product or corporate services launches or sending files containing customers’ confidential address and credit card data. Popular file transfer systems are not only inherently insecure, but users often forget to delete files after sending them. Leaving these files out there on the internet makes them easier to find and hack, and it is often these larger files which include sensitive information which poses a huge security risk.

One landmark security breach, which happened a decade ago, involved a huge data leak from Sony Pictures. The hack not only led to the leaking of unreleased films and confidential data but also highlighted the serious implications of inadequate cybersecurity measures for corporations and governments alike. Over 100 Terabytes containing confidential company activities were breached, resulting in well over $100 million lost. The phishers pretended to be colleagues of the top-level employees who opened the malicious attachments in the phishing emails. Specifically, a fake Apple ID verification email was used in the attack.

Security has moved on significantly since then but is ever-changing as businesses continue to respond to new threats.

To comply with the highest security requirements today, businesses should consider including file-level password protection, file retention period or one time retrieval. Any file not retrieved within the retention period should be deleted and the sender notified so that the sender can keep tabs on where exactly the file is at any point.
As the law changes to protect consumers, businesses must be mindful of meeting legal requirements such as GDPR when it comes to sending confidential data.

All businesses from corporates to micro businesses have a responsibility to protect sensitive data and use a file transfer system that allows them to do that; a system where files are encrypted in transit and transferred to selected recipients.

To resolve this, businesses should use Public Key Infrastructure (PKI) certificates and ensure files are removed from the system once retrieved by the recipient for increased security. PKI uses asymmetric encryption methods to ensure that messages remain private and also to authenticate the device or user sending the transmission. In essence, it verifies that the data and files are received by the right person whilst encrypting the data during the transit.

Whatever the size of the company, organisations must adopt a holistic approach to mitigate the risks posed in email cybersecurity, starting with enhanced internal employee training programmes that emphasise real-world scenarios, such as identifying phishing attempts or responding to suspicious emails. Regular updates are crucial as threats evolve, as is creating a culture of vigilance.

Businesses that want to remain cyber safe in 2025 need to think about investment in advanced email security tools that use AI to detect and block sophisticated threats.

These systems should complement, not replace, human awareness and judgment and regular phishing simulations and penetration tests need to be conducted to assess vulnerabilities and improve response strategies.

Richard Bourne is CEO of Liverton Security

Image: Ideogram

You Might Also Read: 

The Challenges Of Middle Management In Email Cybersecurity:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« A History Of Artificial Intelligence And Its Current & Future Development [extract]
Google Reports Widespread Misuse Of Gemini AI »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ThreatHunter.ai

ThreatHunter.ai

ThreatHunter.ai (formerly Milton Security) is a business that tracks down and mitigates attacks in real time using our ARGOS Platform and our Elite Threat Hunters.

KBR

KBR

To help governments and other agencies to combat cyber threats, KBR is safeguarding their most valuable systems with sophisticated tools, hardware and training.

Lightspin

Lightspin

Lightspin is a contextual cloud security platform that continuously visualizes, detects, prioritized, and prevents any threat to your cloud stack.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

Help AG

Help AG

Help AG provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security solutions and services.

McCrary Institute - Auburn University

McCrary Institute - Auburn University

The McCrary Institute seeks practical solutions to real-world problems in the areas of cyber and critical infrastructure security.

Matrium Technologies

Matrium Technologies

Matrium Technologies has been a leading provider of technology solutions since 1991, with a strong industry background in Network Testing, Network Visibility and Security.

Harvey Nash

Harvey Nash

Harvey Nash is a leading global provider of talent and technology solutions.

GajShield

GajShield

GajShield Infotech provides Data Security Firewall solutions to Corporate’s and Government agencies.

Onyxia Cyber

Onyxia Cyber

Onyxia's unique dynamic cybersecurity platform identifies gaps and prioritizes recommendations for proactive cybersecurity strategy, performance, remediation and management.

LastPass

LastPass

LastPass provides award-winning password and identity management solutions that are convenient, effortless, and easy to manage.

ISSQUARED

ISSQUARED

ISSQUARED is a leading provider of Cyber Security, Cloud, Infrastructure, Consulting and Digital Transformation services.

CommandK

CommandK

CommandK provides companies with infrastructure to protect their sensitive data. Built-in solutions to prevent data-leaks and simplify governance.

Cybersecurity Dubai

Cybersecurity Dubai

Protect your business from cyber-attacks with Cybersecurity Dubai, your partner in online security solutions.

TrustCloud

TrustCloud

TrustCloud is a global company specializing in the orchestration and custody of secure digital transactions including identification, signature, payments, and electronic custody.

Netsurit

Netsurit

Managed IT, Cloud, and Security Services. Netsurit is Your IT Innovation and Digital Transformation Accelerator.

US Insider Risk Management Center of Excellence (US-InRM)

US Insider Risk Management Center of Excellence (US-InRM)

The US-InRM Center of Excellence is a nonprofit organization dedicated to promoting private, public, and academic partnerships to foster knowledge sharing and resources to mitigate insider risk.