Agencies overlook file transfer security
A survey finds the basics of file protection are often ignored
- By David Hubler
- May 10, 2010
The government spends $7.9 billion annually on sophisticated cybersecurity measures, but agencies too often ignore the basics of protecting files, according to a new survey on federal encryption and other security measures.
In April, MeriTalk, a government information technology provider, teamed with Axway, a business interaction networks company in Phoenix, to survey 200 federal IT and information security professionals on file transfer practices and potential security improvements.
The survey found that employees at agencies whose managers understand the effects of cyber threats are more than twice as likely (53 percent vs. 12 percent) to follow correct policies. However, only 58 percent of those surveyed are aware of agency file transfer policies.
The survey report, “Why Encrypt? Federal File Transfer Report,” found that data security vulnerabilities at federal agencies are mainly due to employees’ use of unsecure methods to exchange information, such as File Transfer Protocol (FTP).
The unsecure methods exist despite the Secure Federal File Sharing Act, which the House passed March 24 to prevent government employees from using peer-to-peer file-sharing software, including FTP, the report states.
Specifically, the report shows that federal employees use unsafe methods to transfer files in the following ways:
- 66 percent use physical media (e.g., tapes, CDs, DVDs, USB drives, etc.).
- 60 percent use FTP.
- 52 percent send work files through personal e-mail accounts (e.g., Gmail, Yahoo, etc.).
The report calls for agencies to gain the support of top managers and educate employees about the need to secure federal data.
David Hubler is the former print managing editor for GCN and senior editor for Washington Technology. He is freelance writer living in Annandale, Va.