Cybersecurity Awareness - August 2025


Article Body

NEED TO KNOW NEWSLETTER        AUGUST 2025

 

File sharing basics

 

The days of paper files are gone. Our information is either online or stored on our localized devices. In the context of remote work, hybrid work environments, and working with contracted vendors, data transfer is an essential process. And with that, we need to ensure that our files are secured while they are stored and in transit.

Secure file sharing

Secure file sharing is when different users or organizations protect the transfer of files. This is primarily done by restricting access to the files, and ensuring the data is encrypted during transit and while at rest.

Some file-sharing methods are more secure than others. A few of the most common methods are storing files on a file server or using web-based cloud storage with shareable links. In both cases, permissions for the document can be controlled by the document owner.

To protect files both at rest and in transit, encryption is essential. It secures data by converting it into an unreadable format, accessible only to authorized users who can restore it to its original form.

File sharing risks and responsibilities

Organizations try their best to control and secure their information. To help your organization keep data secure, follow all policies and procedures.

One way to do that is to only use organization-approved services. If you were to download your own file transfer tool, it is out of IT’s control, meaning updates may not be applied and security issues may be unknown.

Avoid using removable media, if possible. USB devices are easy to use, but also easy to hide malware. It is best practice to only trust a removable media device from sources known to you.

If you find a discarded or lost USB drive, report it and hand it over to your IT department or your manager to safely access whatever information is on it. Never plug it into your computer.

Cloud storage is useful, but it is a target for hackers. To protect your information, know who you're granting access to and what type of access. Many providers offer edit, read-only, or comment access. Ensure you understand the differences and choose appropriately.

Data Classification

Data classification is a critical process within an organization that involves categorizing data based on its level of sensitivity and importance.

Data classification is a way to organize and protect your organization’s information based on how sensitive or important it is.

By doing this, organizations make sure that sensitive data is kept safe and only accessible to those who need it.

Data Classification helps:

  • Prevent unauthorized access
  • Ensure data protection policy
  • Compliance with regulations

By classifying our data, we can manage it better, reduce risks, and create a culture of security awareness within our organization.

 

MOVEit Zero Day attack

One of the more popular tools used for file sharing and file transfer services is called MOVEit. MOVEit encrypts your data and uses file transfer protocols to send it safely from one user to another. Recently, hackers attacked MOVEit. Using a technique known as SQL injection, they were able to access and copy the data of MOVEit users.

When the breach was discovered, MOVEit owners issued a patch. But it was too late. The hackers had already exploited the vulnerability for more than a month, and the damage had been done.

Takeaways:

  • When breaches are discovered, software needs to be patched. Keeping your device, software and apps up to date will help keep you from being a target in a breach.
  • Only use file storage, transfer, sharing, and encryption tools that have been approved for use by your organization.