Ad-Hoc File Transfers Present Challenges, Vulnerabilities
Regardless of industry or job title, most employees who sit at a computer screen all day have, at one time or another, needed to email a file that was too big to send. For most people outside of IT, that posed a significant obstacle.
Take Betsy, for example. How could Betsy in Marketing send the CEO’s requests for changes to the annual report back to the ad agency if the file was too large to attach to an email? Fax it, maybe? So old school!
Betsy is eager to do a good job and meet expectations, and hates depending on someone else to help her do something she perceives should be relatively easy to do — like send a file as an email attachment. Therefore, because her boyfriend told her something about FTP-something, she uses a search engine and finds a host of FTP tools she can download for free that promise to solve her problem quickly and easily. Score!
Free FTP tools, browser apps, and cloud-based storage, oh my!
This scenario is replicated in thousands of companies every day. Employees download FTP tools or use FTP features that “come with” their browser, and they rejoiced believing that their file transfer problems were solved. Others created accounts on cloud-based file storage systems where they uploaded files and then sent an invitation to the recipient to download the file using a specific link.
Unfortunately, while a free FTP tool downloaded from the Internet might solve an immediate need, it often creates a host of other problems, and many of them go unnoticed because IT administrators are unaware that this is happening.
Here are just a few of the challenges for the IT staff:
- Who has what tool installed on which machine?
- Who provides support for these tools if there’s a problem with a file transfer?
- How are the file transfers secured to prevent data breach?
- Who is monitoring what data is being transferred, by whom, to which recipients, and for what purpose?
- How is the receipt of the documents confirmed?
- How will compliance auditors view this approach to ad-hoc file transfers?
There’s no easy solution — or is there?
Company policies could dictate a variety of solutions. They could block the download of any apps to individual desktops at work, and/or require people who need to do ad-hoc file transfers to register the tool and the relevant login data with the IT department for approval. They could require that anyone who needed to send a large file make a formal request to the IT department and wait for someone there to send it via the company’s official FTP software or managed file transfer solution. They could require all staff to sit through mandatory training to deter them from continuing this practice.
A more effective approach might be implementing a secure mail tool. A trustworthy secure mail system will keep the files that need to be transferred stored securely within the organization’s network, and will allow authorized users to email a unique link to a trading partner that they would use to access and download the files via an HTTPS secure channel.
Most of the cloud-based file storage systems provide a similar approach, allowing users to store their files and then invite others to view or download them using a link.
There are critical differences, though, between a secure mail system and the cloud-based apps. Most importantly, secure mail gives control back to an organization’s IT administrators so they can track file transfers and maintain audit logs, both of which are required by most compliance regulations such as HIPAA, PCI DSS, SOX and GLBA. A secure mail system that is controlled by the IT staff can ensure that file transfer policies are followed, and can include additional security features such as requiring additional password protection, applying link expiration dates, and other features.
Most organizations want efficient workflows, employees who feel empowered to do what it takes to meet expectations, and assurances that the data they store and transfer is insulated from external threats. A secure mail ad-hoc file transfer solution seems like a smart way to accomplish all of those goals.
GoAnywhere Services just released a new Secure Mail module, so check it out.