The year 2021 dramatically boosted digitisation: we have moved our physical workplace online, and in this fast-paced world, the movement of data has become more fluid than ever before.
However, this scenario is not without risks: the University of Maryland has estimated hacker attacks at the rate of one every 39 seconds this year. That's why more and more people are employing secure file sharing solutions to collaborate.
On this page, you’ll find:
People send files every day without even thinking about the risks involved in the chosen channels. That’s why it often happens that private keys are sent via email or unsecure tools like Wetransfer.
In 2021, hopefully people and companies are getting into the habit to share files securely. But what does this term mean?
Secure file transfer is not just the “pure” act, but a series of practices that ensures digital documents are shared safely. It allows sharing files between different organizations/users and protects data from access by unauthorized external parties.
Some of these practices are:
Now that we’ve covered what secure file transfer is, let’s move on and find out why it’s so important.
Share files securely is very important, especially now that the workplace has moved to an online environment. Below are some of the benefits involved:
Now that we’ve seen the key advantage points when it comes to secure file transfer, let’s move on to look at some examples.
There are several types of file sharing options available. Below we'll look at some of them, from the most basic to the modern ones.
USB flash drives are among the most basic options for sharing files: you insert the pen-drive, upload and transfer the data you need to your computer, and that's it. The exchange happens physically - you own the pen-drive and give it to another person.
Examples: USB flash drives, external hard-disk drives...
When it comes to online file sharing, the first choice always goes to email - who doesn't have a free Gmail account today? Just log in, type and attach what you need and then click to send. You can even set priority and open receipts.
However, email is neither encrypted (at least the supposedly "free" ones - check Tutanota for a secure email service), nor does it allow you to send large files.
Examples: mainstream “free” services as Gmail & Hotmail or encrypted ones as Protonmail & Tutanota.
P2P networks have always been associated with online media piracy - in the 00s Napster and eDonkey2000 were built specifically for this purpose. The concept of P2P networks is to transfer files between network connections instead of going through the central server, every time you send data.
However, peer-to-peer technology has changed, and created a very secure method of file sharing for confidential documents. You can learn more here: What are P2P networks and why they are not just for illegal activities.
Examples: BitTorrent, Shareaza, eMule, Kazaa.
Document collaboration tools go beyond file saving and ease of use. These tools shape the way we interact and collaborate remotely with our colleagues in real time and on the same document. However, most of them are not very secure.
Examples: Microsoft 365, Trello, Basecamp.
Cloud storage, often referred to simply as "the cloud", offers an easy way to store and manage data in an off-site location (most often someone else's data center) that anyone authorized can access remotely over the internet. Unlike document collaboration tools, here all data is managed online.
This option is the most adopted when it comes to storing, collaborating and sharing documents. So common to the point that people have become accustomed to unsafe practices such as storing confidential data on less-than-secure cloud storage services, incurring “unexpected” data breaches - this was the Dropbox case in 2012 with 68M leaked accounts.
However, there are a number of innovative companies employing cutting-edge technology to enable discerning businesses to deal with their confidential documents. One innovation evolving in 2021 is the “distributed cloud” (which leverages p2p networks) - you can read more about it here.
Examples: Dropbox, OneDrive, Cubbit.
Wondering which cloud storage provider is the most secure in 2021? Check out the list, along with pros and cons, in this article from Cloudstorageinfo!
We've considered the main alternatives when it comes to sending information. Now let's take a look at the best tips for share files securely.
As you may have noticed from the previous sections, online file sharing entails various benefits. However, it also comes with some risks that can't be ignored. In this section we'll take a look at some main points to consider when it comes to secure file sharing, especially when it's done on “the cloud".
One of the key elements to consider is the level of encryption of the platform being used. The goal is to make sure the information is unreadable except for authorized parties. Almost every collaboration or cloud platform today is encrypted (even Google Drive!), but what differs is the level of encryption.
Below are some definitions:
While on mainstream services such as Dropbox, the in-transit and at-rest encryption layers are combined, they do not guarantee the needed security and privacy for the user. Instead, you should look to zero-knowledge, end-to-end encrypted services to securely share files with your colleagues. Learn more about the different types of encryption - here.
Security is not only about the layers adopted by the service provider. 90% of data breaches are caused by human errors and that's why there are also some tips on how to behave and what to do to avoid unexpected events.
These are some of the top tips when it comes to creating a secure ecosystem beyond the platform used to share files.
If you want to dig deeper into this topic you can check out the article: How to protect your privacy online: 5 actionable tips!
Cubbit Private Links are a unique feature of Cubbit - the first distributed cloud storage in Europe.
This is an ultra-secure file sharing option while being super-easy to use:
P.S. Files uploaded on Cubbit are zero-knowledge, end-to-end encrypted. No one, not even the service provider, can access the data.
You can start sharing safely today: get your Cubbit Cell and try it for 30 days. If you decide it’s not for you, we will issue a full refund and you’ll be able to return your Cell for free.
Subscribe not to miss new articles and updates about Cubbit.
36bn leaks, ransom spiked by 700%: 2020 was the year of cyber thieves. For Cybersecurity Month, cloud storage privacy & security expert Dejan shares 4 tips.
La collaborazione tra l’operatore 5G e la startup punta ad applicare un nuovo paradigma di cloud distribuito che garantisca sovranità del dato, tutela della privacy, costi contenuti e riduzione delle emissioni di Co2. La sperimentazione con Linkem si svolge nell’ambito di Next Generation Cloud Pioneers.
Subscribe now to our newsletter to keep you posted on the latest news and get exclusive perks!