File Transfers Can Be The Weakest Link

Sending files used to be easy, just a matter of attaching them to an email, but as files are getting bigger, and anything over 20MBs is likely to be rejected, people have moved to using more complex, web-based, sharing platforms. These methods are often complicated, and most are not wholly secure.

Files reside anywhere in the world and are accessible by unknown people. They are regularly uploaded and then forgotten, left dormant on an unknown server. File transfers need to be easy, quick and most of all, safe.

The big challenge today is getting back to a simpler way of transferring files via email but it requires more than just a traditional email gateway solution to protect businesses and their people from malicious actors.

As email threats evolve and multiply worldwide, demand for email security protection increases. Common email threats include phishing, business email compromise (BEC) and malware attacks, with phishing being the cause of 84% of cybersecurity data breaches.  As human error or inaction lies at the heart of a breach, a deep understanding of human behaviour is the key consideration in protecting companies and employees from attacks. CTOs must look for the right tools, specifically to suit the needs of their businesses and employees, rather than buying ‘off the peg’.

File-sharing based phishing attacks have skyrocketed over the last year, exploiting the most commonly used webmail and sharing platforms and because they have recognisable brand names, they are not always treated as threats. Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware. A file-sharing phishing attack is a unique type of phishing threat in which a cyber-criminal poses as a known colleague and uses a familiar file-hosting solution to send a target a malicious email containing a link to what appears to be a shared file or document. Clicking on the link can result in infecting the device with malware or stealing login information.

Another common security threat with file transfers is that the data being transferred is often highly confidential in nature. Examples include sending briefing notes and slides to an external agency partner or client on new product or corporate services launches or sending files containing customers’ confidential address and credit card data. Popular file transfer systems are not only inherently insecure, but users often forget to delete files after sending them. Leaving these files out there on the internet makes them easier to find and hack, and it is often these larger files which include sensitive information which poses a huge security risk.

One landmark security breach, which happened a decade ago, involved a huge data leak from Sony Pictures. The hack not only led to the leaking of unreleased films and confidential data but also highlighted the serious implications of inadequate cybersecurity measures for corporations and governments alike. Over 100 Terabytes containing confidential company activities were breached, resulting in well over $100 million lost. The phishers pretended to be colleagues of the top-level employees who opened the malicious attachments in the phishing emails. Specifically, a fake Apple ID verification email was used in the attack.

Security has moved on significantly since then but is ever-changing as businesses continue to respond to new threats.

To comply with the highest security requirements today, businesses should consider including file-level password protection, file retention period or one time retrieval. Any file not retrieved within the retention period should be deleted and the sender notified so that the sender can keep tabs on where exactly the file is at any point.
As the law changes to protect consumers, businesses must be mindful of meeting legal requirements such as GDPR when it comes to sending confidential data.

All businesses from corporates to micro businesses have a responsibility to protect sensitive data and use a file transfer system that allows them to do that; a system where files are encrypted in transit and transferred to selected recipients.

To resolve this, businesses should use Public Key Infrastructure (PKI) certificates and ensure files are removed from the system once retrieved by the recipient for increased security. PKI uses asymmetric encryption methods to ensure that messages remain private and also to authenticate the device or user sending the transmission. In essence, it verifies that the data and files are received by the right person whilst encrypting the data during the transit.

Whatever the size of the company, organisations must adopt a holistic approach to mitigate the risks posed in email cybersecurity, starting with enhanced internal employee training programmes that emphasise real-world scenarios, such as identifying phishing attempts or responding to suspicious emails. Regular updates are crucial as threats evolve, as is creating a culture of vigilance.

Businesses that want to remain cyber safe in 2025 need to think about investment in advanced email security tools that use AI to detect and block sophisticated threats.

These systems should complement, not replace, human awareness and judgment and regular phishing simulations and penetration tests need to be conducted to assess vulnerabilities and improve response strategies.

Richard Bourne is CEO of Liverton Security

Image: Ideogram

You Might Also Read: 

The Challenges Of Middle Management In Email Cybersecurity:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« A History Of Artificial Intelligence And Its Current & Future Development [extract]
Google Reports Widespread Misuse Of Gemini AI »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

Bit4id

Bit4id

Bit4id provides technologies for electronic signature, online authentication, cybersecurity and all other services based on the concept of digital identity.

SAASPASS

SAASPASS

SAASPASS is a full-stack identity and access management solution, a single product which allows you to manage all your digital and physical access needs securely and conveniently.

Sectigo

Sectigo

Sectigo is a leading cybersecurity provider of digital identity solutions, including TLS / SSL certificates, DevOps, IoT, and enterprise-grade PKI management, as well as multi-layered web security.

SensorHound

SensorHound

SensorHound’s mission is to improve the security and reliability of the Internet of Things (IoT).

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.

ACL Digital

ACL Digital

ACL Digital, an ALTEN Group company, is a leader in design-led digital experience, innovation, enterprise modernization, and product engineering services converging to Technology, Media & Telecom.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

Valeo Networks

Valeo Networks

Valeo Networks is a full-service Managed Security Service Provider (MSSP). We partner with organizations to remove the burden of technology so that they can focus on growing their business.

Radius Technologies

Radius Technologies

Radius Technologies is trusted by progressive SMEs to deliver world-class cloud, IT solutions, IT and data security, and telecoms systems.

Brightworks Group

Brightworks Group

BrightWorks Group offer comprehensive technology operations and security operations consulting services, tailored to meet your specific needs.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

Swick Technologies (SWICKtech)

Swick Technologies (SWICKtech)

SWICKtech offer IT managed services to increase IT security, stability, and performance for your organization.

Synqly

Synqly

Synqly are on a mission to enable quick, secure, and sustainable integrations between any cybersecurity and infrastructure technologies.

Supersecure

Supersecure

Supersecure is a Managed Security Service Provider (MSSP) offering a wide range of information security solutions.