File Transfers Can Be The Weakest Link

Sending files used to be easy, just a matter of attaching them to an email, but as files are getting bigger, and anything over 20MBs is likely to be rejected, people have moved to using more complex, web-based, sharing platforms. These methods are often complicated, and most are not wholly secure.

Files reside anywhere in the world and are accessible by unknown people. They are regularly uploaded and then forgotten, left dormant on an unknown server. File transfers need to be easy, quick and most of all, safe.

The big challenge today is getting back to a simpler way of transferring files via email but it requires more than just a traditional email gateway solution to protect businesses and their people from malicious actors.

As email threats evolve and multiply worldwide, demand for email security protection increases. Common email threats include phishing, business email compromise (BEC) and malware attacks, with phishing being the cause of 84% of cybersecurity data breaches.  As human error or inaction lies at the heart of a breach, a deep understanding of human behaviour is the key consideration in protecting companies and employees from attacks. CTOs must look for the right tools, specifically to suit the needs of their businesses and employees, rather than buying ‘off the peg’.

File-sharing based phishing attacks have skyrocketed over the last year, exploiting the most commonly used webmail and sharing platforms and because they have recognisable brand names, they are not always treated as threats. Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware. A file-sharing phishing attack is a unique type of phishing threat in which a cyber-criminal poses as a known colleague and uses a familiar file-hosting solution to send a target a malicious email containing a link to what appears to be a shared file or document. Clicking on the link can result in infecting the device with malware or stealing login information.

Another common security threat with file transfers is that the data being transferred is often highly confidential in nature. Examples include sending briefing notes and slides to an external agency partner or client on new product or corporate services launches or sending files containing customers’ confidential address and credit card data. Popular file transfer systems are not only inherently insecure, but users often forget to delete files after sending them. Leaving these files out there on the internet makes them easier to find and hack, and it is often these larger files which include sensitive information which poses a huge security risk.

One landmark security breach, which happened a decade ago, involved a huge data leak from Sony Pictures. The hack not only led to the leaking of unreleased films and confidential data but also highlighted the serious implications of inadequate cybersecurity measures for corporations and governments alike. Over 100 Terabytes containing confidential company activities were breached, resulting in well over $100 million lost. The phishers pretended to be colleagues of the top-level employees who opened the malicious attachments in the phishing emails. Specifically, a fake Apple ID verification email was used in the attack.

Security has moved on significantly since then but is ever-changing as businesses continue to respond to new threats.

To comply with the highest security requirements today, businesses should consider including file-level password protection, file retention period or one time retrieval. Any file not retrieved within the retention period should be deleted and the sender notified so that the sender can keep tabs on where exactly the file is at any point.
As the law changes to protect consumers, businesses must be mindful of meeting legal requirements such as GDPR when it comes to sending confidential data.

All businesses from corporates to micro businesses have a responsibility to protect sensitive data and use a file transfer system that allows them to do that; a system where files are encrypted in transit and transferred to selected recipients.

To resolve this, businesses should use Public Key Infrastructure (PKI) certificates and ensure files are removed from the system once retrieved by the recipient for increased security. PKI uses asymmetric encryption methods to ensure that messages remain private and also to authenticate the device or user sending the transmission. In essence, it verifies that the data and files are received by the right person whilst encrypting the data during the transit.

Whatever the size of the company, organisations must adopt a holistic approach to mitigate the risks posed in email cybersecurity, starting with enhanced internal employee training programmes that emphasise real-world scenarios, such as identifying phishing attempts or responding to suspicious emails. Regular updates are crucial as threats evolve, as is creating a culture of vigilance.

Businesses that want to remain cyber safe in 2025 need to think about investment in advanced email security tools that use AI to detect and block sophisticated threats.

These systems should complement, not replace, human awareness and judgment and regular phishing simulations and penetration tests need to be conducted to assess vulnerabilities and improve response strategies.

Richard Bourne is CEO of Liverton Security

Image: Ideogram

You Might Also Read: 

The Challenges Of Middle Management In Email Cybersecurity:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« A History Of Artificial Intelligence And Its Current & Future Development [extract]
Google Reports Widespread Misuse Of Gemini AI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Renaissance

Renaissance

Renaissance is Ireland's premier value added distributor of IT security solutions and a leading independent provider of business continuity consultancy.

Roka Security

Roka Security

Roka Security is a boutique security firm specializing in full-scale network protection, defending against advanced attacks, and rapid response to security incidents.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

AET Europe

AET Europe

AET Europe is specialised in creating technological solutions for user identification and authentication.

CloudAlly

CloudAlly

CloudAlly provides online cloud to cloud backup and recovery solutions, which backs up daily changes in your SaaS to unlimited Amazon S3 storage and makes it available for restore or export.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

Keepnet Labs

Keepnet Labs

Keepnet Labs is a phishing defence platform that provides a holistic approach to people, processes and technology to reduce breaches and data loss and presents anti-phishing solutions.

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

Otorio

Otorio

OTORIO delivers industrial cybersecurity and digital risk-management solutions and services. We help our customers to keep their revenue-generating operations resilient, efficient, and safe.

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

Distology

Distology

Distology are an award-winning cloud security distributor bringing a wealth of experience and strong relationships with a huge breadth of partners covering the UK, Ireland and Benelux.

Zitec

Zitec

One of Europe's largest and most prominent full-cycle software development services companies, Zitec is the digital transformation partner to companies in the EU, UK, USA, Canada and ME.

Carahsoft Technology Corp

Carahsoft Technology Corp

Carahsoft Technology is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets.

Defimoon

Defimoon

DeFimoon is the International Blockchain Development & Security Agency. We provide professional services and solutions at the highest quality on world-leading chains.