This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

FTP described as unsecure and generally unmonitored

Share this article:

FTP has been described as easy to intercept as transmissions are delivered in clear text.

According to Axway, usernames, passwords, commands and data can be easily intercepted and read while files transferred via FTP are uploaded or downloaded without any encryption.

In a survey of 500 public sector IT workers, it found that 61 per cent do not monitor FTP usage despite 76 per cent having concerns about the current security of file transfers.

Stuart Feargrieve, managing director of Axway UK, said: “It is important that the public sector remembers its basic responsibility to protect government files and eradicating FTP has to be a priority.

“Although the public sector is facing cuts and efficiency measures, ignoring the issue of FTP of for file transfers is a false economy. By investing in the right technology to help IT managers handle interactive, user-driven communications and automated file transfer over the internet and private IP networks, they could save money and time by consolidating disparate systems."

Tony Pepper, CEO of Egress, said: “These statistics are powerful but only reveal the tip of the iceberg. Sending email messages with attachments or transferring large files (typically using FTP servers or hosted file sharing websites) needs to have a collective security focus.

“Demonising how organisations monitor and upload files to FTP servers is only looking at one aspect of a much broader industry problem. Every day we win more accounts because customers are increasingly asking for a holistic approach to sharing confidential information.

“This modern trend demands technology that promotes secure collaboration and delivers ‘follow the data' protection, irrespective of how the information has been sent.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Researcher develops BadUSB code to compromise USB sticks ...

Karsten Nohl also reveals how an enhanced security approach can beat his USB architecture compromise.

Cybercrime threat landscape evolving rapidly

Cybercrime threat landscape evolving rapidly

New research claims to show that, whilst spam levels fell to a five-year low last month, the increasing complexity of cyber-criminal attacks shows no sign of easing, with increasing levels ...

Tor Project unearths attack that identifies users

Tor Project unearths attack that identifies users

Users of The Onion Router (TOR) network have been warned of an attack that could deanonymise them if they used the service from February to July this year.