Filter by Category

Ad-Hoc File Transfers Present Challenges, Vulnerabilities, and More

Learn How to Get Around Ad-Hoc File Transfer Challenges

Regardless of industry or job title, most employees who sit at a computer screen all day have, at one time or another, needed to email a file that was too big to send. For most people outside of IT, that posed a significant obstacle.

Take Betsy, for example. How could Betsy in Marketing send the CEO's requests for changes to an annual report back to the ad agency if the file was too large to attach to an email? Use a flash drive? This seems like an inefficient method.

Like any good employee, Betsy is eager to do a good job and meet expectations and looks for a solution to her problem. She knows that it should be easy to complete a task like sending a file as an email attachment. A quick search leads her to find a host of FTP tools she can download for free that promise to solve her problem quickly and easily. So, what kinds of solutions are out there?

Free FTP Tools, Browser Apps, and Cloud-Based Storage

This scenario is replicated in thousands of companies every day. Employees download FTP tools or use FTP features that "come with" their browser, and they rejoiced believing that their file transfer problems were solved. Others created accounts on cloud-based file storage systems where they uploaded files and then sent an invitation to the recipient to download the file using a specific link.

Unfortunately, while a free FTP tool downloaded from the Internet might solve an immediate need, it often creates a host of other problems, and many of them go unnoticed because IT administrators are unaware that this is happening.

Here are just a few of the challenges IT staff face when this occurs:

  • Who has what tool installed on which machine?
  • Who provides support for these tools if there's a problem with a file transfer?
  • How are the file transfers secured to prevent data breach?
  • Who is monitoring what data is being transferred, by whom, to which recipients, and for what purpose?
  • How is the receipt of the documents confirmed?
  • How will compliance auditors view this approach to ad-hoc file transfers?

There's No Easy Solution--Or is There?

Company policies could dictate a variety of solutions. They could block the download of any apps to individual desktops at work, and/or require people who need to do ad-hoc file transfers to register the tool and the relevant login data with the IT department for approval. They could require that anyone who needed to send a large file make a formal request to the IT department and wait for someone there to send it via the company's official FTP software or managed file transfer solution. They could require all staff to sit through mandatory training to deter them from continuing this practice.

A more effective approach might be implementing a secure mail tool. A trustworthy secure mail system will keep the files that need to be transferred stored securely within the organization's network, and will allow authorized users to email a unique link to a trading partner that they would use to access and download the files via an HTTPS secure channel.

Most of the cloud-based file storage systems provide a similar approach, allowing users to store their files and then invite others to view or download them using a link.

There are critical differences, though, between a secure mail system and the cloud-based apps. Most importantly, secure mail gives control back to an organization's IT administrators so they can track file transfers and maintain audit logs, both of which are required by most compliance requirements such as HIPAA, PCI DSS, SOX and GLBA. A secure mail system that is controlled by the IT staff can ensure that file transfer policies are followed, and can include additional security features such as requiring additional password protection, applying link expiration dates, and other features.

Looking for Secure Mail Solutions for Outlook?

Organizations want efficient workflows and employees want to feel empowered to do what it takes to meet expectations and ensure that the data they store and transfer is insulated from external threats. A secure mail ad-hoc file transfer solution is an effective way to accomplish organization goals.

Latest Posts


Heads up! New Canadian Data Privacy Act is Around the Corner

October 13, 2021

Canada’s data privacy laws may soon be changing. Brush up on what’s expected to change and how your organization can comply with stronger security safeguards.


The 5 Biggest Cybersecurity Threats of 2022: How to Avoid Cybersecurity Attacks

October 12, 2021

Learn about the biggest threats to cybersecurity in the year 2022 and how to protect your organization from cybersecurity attacks tomorrow.


How Windows Works with GoAnywhere MFT

October 7, 2021

Improve your Windows secure file transfer when you use GoAnywhere MFT’s SFTP server. Learn how running managed file transfer (MFT) on Windows streamlines and simplifies your processes.


It’s Cybersecurity Awareness Month!

October 5, 2021

October is Cybersecurity Awareness Month! However, Cybersecurity is a year-round challenge that consistently needs to be met. Read our blog for some of the latest insights in cybersecurity and key tips for keeping data security at the top of its game. #BeCyberSmart


MFT Plus Clearswift Equals More Secure File Exchanges

September 30, 2021

Adding the content inspection functionality of DLP to the secure file transfer of MFT results in amped up file security, automation and centralization. Learn how GoAnywhere and Clearswift are a potent combo.