Top Secure File Transfer Methods 2020

It’s a new decade, and many businesses are engaging with customers all over the world. This means having secure file transfer methods is vital for any business to stay on top of their game.

Secure File Transfer Methods

Each file transfer — whether its customer orders, inventory data, client communications or product documentation — needs to protect the data being transferred.

One way to ensure you are protecting customer data is to look for security features that protect from and avoid man-in-the-middle attacks. This type of attack is similar to eavesdropping on a conversation. There is a possibility your data could be intercepted by someone “listening in” during the transfer between your computer and a server or other device. Secure file transfer methods make sure eavesdropping, as well as other breaches or privacy violations, do not happen.

Green gate secured with lock and chain

Today, secure file transfer methods are designed to keep your company from experiencing a breach of data during transfer. From simple online file shares to transferring large files and videos on a regular basis, here are three secure file transfer methods that will help you send your business files securely in 2020.

1. SFTP the Secure File Transfer Protocol

SFTP is a separate protocol from FTP. It uses SSH keys which is the “S” part of SFTP. And also what makes this protocol a secure file transfer method.

Secure file transfer methods - SFTP

For secure SFTP file transfers, SSH keys or a user ID and password are required to connect to the server. Your FTP and file sharing service should provide information on setting up SSH keys for your account. SSH protocol includes a public key and a private key, which authenticates the server and the user.

When using SFTP for file transfers, the connection is always secure. SFTP uses encryption and cryptographic hash functions to make sure your data is not readable to anyone during file transfer.  

If you are looking for a reliable way to upload and transfer big files, a hosted FTP service that supports direct SFTP connections is ideal for your business. One plus of choosing SFTP as your secure file transfer method is it being firewall-friendly. SFTP also uses a single port for connections to the server. A single open port allows for faster file transfers between client and server once the connection has been authenticated. 

2. Turn Up Your File Transfer Protocol Security With FTPS

FTPS is an extension of FTP. It uses TLS (Transport Layer Security) or SSL (Secure Sockets Layer) encryption for security you don’t get with standard file transfer protocol (FTP). This additional layer provides a secure connection between client and server.

Secure file transfer methods - FTPS

The FTPS protocol needs the following to connect and allow file transfers:

  • User ID
  • Password
  • Certificate (the server’s certificate)

FTPS does use multiple port numbers to connect and complete your file transfers. The first port is for authentication and commands. After authenticating and establishing a connection with the server, every file transfer request opens another port. Some may argue that having multiple ports open could pose a security issue.

This secure file transfer method excels at server to server file transfer. FTPS is ideal when you need to access the FTP server from personal devices. Software developers using .NET framework often use FTPS as their secure file transfer method.

You may find less support for and more configuration needed when using FTPS. But, the use of TLS & SSL cryptographic protocols that are part of FTPS makes this a preferred file transfer method for many businesses.

3. Encrypted Website Connections

HTTPS is the Hypertext Transfer Protocol “Secure.”

We’re talking about that stuff that comes before the www when you visit a website. HTTPS signals an encrypted website connection vs. HTTP.  The HTTPS protocol is how a web browser communicates with websites.

HTTPS can’t be monitored or tampered with. No man-in-the-middle attacks. HTTPS checks the website security certificate and ensures you are talking to the real website, not an impersonator. Today, most business websites default to HTTPS. However, it is a good idea to check the hypertext transfer protocol when visiting new websites or if you get warnings or pop-ups verifying you want to go to that particular site. Look for HTTPS at the beginning of the web address or look for the lock symbol before the website name in your address bar.

Web address with HTTPS
Web address bar with security lock icon

It is important to know what type of connection you have if you are using a web interface to access your files. For example, if you are entering information to place an order online, or requesting customer information in a form on your website.

HTTPS works in tandem with SSL (the secure sockets layer that adds the encryption part of FTPS). Your browsing privacy with HTTPS only allows others to see there is a connection to a secure site. They can not see specific pages you visit or any additional browsing information.

As a secure file transfer method, HTTPS is best for banking, sending payments, and transferring private or sensitive data from a user through a website. Any transfers requiring a password should only be sent with the HTTPS protocol.

Tips for Secure File Transfer Worldwide

There are protocols for a variety of different data and file transfers. Whatever secure file transfer method you choose, there are a few additional things that can mitigate security concerns and improve workflow.

Compliance

Data security is on everyone’s mind. Look for an FTP and file sharing provider that is GDPR compliant. The General Data Protection Regulation was designed to give EU citizens more rights over their personal data, but impacts every U.S. business that has EU customers. With our global economy, GDPR compliance should be the standard everywhere. It shows that in good faith, a company has does its due diligence to take data security seriously.

This year, we saw the CCPA (California Consumer Privacy Act) come into effect. Check for compliance with specific regional, and other laws and regulations. Specific industries and types of data may need additional security compliance to meet government requirements. For example, Privacy Shield Certification in the U.S. and EU includes data protection requirements when transferring personal data.

Permissions

File sharing user permissions sample

Utilize permissions for your file-sharing account. Choose a company that allows you to set up new users with granular permissions. Don’t get caught not knowing who accessed your files or how a file got deleted. Granular permissions should allow you to give each user the access rights you want them to have – uploading, downloading, read-only, delete, restricted access to specific folders, all-access admin privileges, etc.

Activity logs & Notifications

File sharing activity log filters

It is no longer effective to track anything in email chains. Email can get messy with ongoing threads and is not a recommended method to securely send information. Use activity logs and notifications to track your secure file transfers. The activity log on your file sharing account will show you all user activity and can easily be filtered by day or username. Notifications alert you when specific files have been uploaded or downloaded. Notifications help you keep track of the who, what and when for your file shares.

File management

Finally, having one place to manage all of your business files reduces security risks. A web-based file manager with custom branding options turns your file sharing service into part of YOUR business. (Accessing via HTTPS of course.)


Need secure file transfer for your business? Sign up for ExaVault today!