CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world...

32
CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY COVER BEING WORKED ON Need high quality logo for cover (EPS) A transparent logo (ie. no background) sent as a PNG or EPS file.

Transcript of CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world...

Page 1: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

CONVERSATIONALFILETRANSFERSANDDATA

SECURITY

COVERBEINGWORKEDON

Needhighqualitylogoforcover(EPS)

Atransparentlogo(ie.nobackground)sentasaPNGorEPSfile.

Page 2: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

SponsoredbyIpswitch

Today’shard-workingITteamsarereliedupontomanageincreasingcomplexityanddelivernear-zerodowntime.IpswitchITandnetworkmanagementsoftwarehelpsthemsucceedbyenablingsecurecontrolofbusiness

transactions,applicationsandinfrastructure.

Ipswitchsoftwareispowerful,flexibleandeasytotry,buyanduse.Thecompany’ssoftwarehelpsteamsshinebydelivering24/7performanceandsecurityacrosscloud,virtualandnetworkenvironments.IpswitchUnifiedInfrastructureandApplicationsMonitoringsoftwareprovidesend-to-endinsight,isextremelyflexibleand

simpletodeploy.Thecompany’sInformationSecurityandManagedFileTransfersolutionsenablesecure,

automatedandcompliantbusinesstransactionsandfiletransfersformillionsofusers.

Ipswitchpowersmorethan150,000networksspanning168countries,andisbasedinLexington,Mass.,withofficesthroughouttheU.S.,Europe,AsiaandLatin

America.

www.ipswitch.com

Page 3: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

ConversationalFileTransfersandDataSecurity

ByBrienPosey

©2017ConversationalGeek®

Page 4: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

ConversationalFileTransfersandDataSecurityPublishedbyConversationalGeek®Inc.

www.conversationalgeek.com

Allrightsreserved.Nopartofthisbookshallbereproduced,storedinaretrievalsystem,ortransmittedbyanymeans,electronic,mechanical,photocopying,recording,orotherwise,withoutwrittenpermissionfromthepublisher.Nopatentliabilityisassumedwithrespecttotheuseoftheinformationcontainedherein.Althougheveryprecautionhasbeentakeninthepreparationofthisbook,thepublisherandauthorassumenoresponsibilityforerrorsoromissions.Norisanyliabilityassumedfordamagesresultingfromtheuseoftheinformationcontainedherein.

TrademarksConversationalGeek,theConversationalGeeklogoandJ.theGeekaretrademarksofConversationalGeek®.Alltermsmentionedinthisbookthatareknowntobetrademarksorservicemarkshavebeenappropriatelycapitalized.Wecannotattesttotheaccuracyofthisinformation.Useofaterminthisbookshouldnotberegardedasaffectingthevalidityofanytrademarkorservicemark.

WarningandDisclaimerEveryefforthasbeenmadetomakethisbookascompleteandasaccurateaspossible,butnowarrantyorfitnessisimplied.Theinformationprovidedisonan“asis”basis.Theauthorandthepublishershallhaveneitherliabilitynorresponsibilitytoanypersonorentitywithrespecttoanylossordamagesarisingfromtheinformationcontainedinthisbookorprogramsaccompanyingit.

AdditionalInformationForgeneralinformationonourotherproductsandservices,orhowtocreateacustomConversationalGeekbookforyourbusinessororganization,pleasevisitourwebsiteatConversationalGeek.com

PublisherAcknowledgments

Allofthefolksresponsibleforthecreationofthisguide:

Author: BrienPosey

ProjectEditor: J.PeterBruzzese

CopyEditor: JohnRugh

ContentReviewer: KarlaReina

Page 5: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

NotefromtheAuthor

GreetingsEarthlings!

WhenitcomestotheworldofIT,thereareafewphilosophiesthatseemtobeuniversallytrue.No,I’mnottalkingaboutMoore’sLaw.I’mtalkingaboutsimplerphilosophieslike“garbagein,garbageout”orPICNICerrors.Fortheuninitiated,PICNICstandsfor“ProblemInChair,NotInComputer”.

Puttingallthejokesaside,oneofthemostfundamentaltruthslearnedoverthelastseveraldecades,isthatdataismuchmoreusefulwhenitisshared.Thinkaboutit…Ifthatstatementwasn’ttrue,thenwewouldn’thavesocialmediasiteslikeFacebookorcollaborativeplatformsforbusiness,likeSharePoint.

Thequestionisnotdowewanttosharedata(ofcoursewedo).Thequestionishowdoweaccomplishthistaskwithoutcompromisingquality,securityandahostofotherfilesharingworries.Thatiswhatthisbookwillhelptoidentifyandanswer.

Ihopeyouenjoyit!

BrienPosey

Page 6: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

The“Conversational”Method

Wehavetwoobjectiveswhenwecreatea“Conversational”book:First,tomakesureit’swritteninaconversationaltonesoit’sfunandeasytoread.Second,tomakesureyou,thereader,canimmediatelytakewhatyoureadandincludeitinyourownconversations(personalorbusiness-focused)withconfidence.

Thesebooksaremeanttoincreaseyourunderstandingofthesubject.Terminology,conceptualideas,trendsinthemarket,andevenfringesubjectmatterarebroughttogethertoensureyoucanengageyourcustomer,team,co-worker,friendandeventheknow-it-allBestBuygeekonalevelplayingfield.

“GeekintheMirror”Boxes

Weinfusehumorintoourbooksthroughbothcartoonsandlightbanterfromtheauthor.Whenyouseeoneoftheseboxes,it’stheauthorsteppingoutsidethedialogtospeakdirectlytoyou.Itmightbeananecdote,itmightbeapersonalexperienceorgutreactionandanalysis,itmightjustbeasarcasticquip,butthese“geekinthemirror”boxesarenottobeskipped.

WithintheseboxesIcansharejustaboutanythingonthesubjectathand.Read’em!

Page 7: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

FileSharing101

Sincethereisobviouslyvalueinsharingdata,thenthenextlogicalquestionbecomes,whatisthebestwaytosharedata?Ofcoursethisseeminglysimplequestiondoesn’talwayshaveasimpleanswer.Therearecountlessmethodsforsharingdata,andeachhasitsadvantagesanddisadvantages.Letmegiveyouanexample.OneofthesimplestmethodsforsharingdataisE-mail.However,E-mailisn’talwaysthebestchoice.E-mailisn’talwayssecure,mailboxescommonlyhaveattachmentsizelimits,themessagemaygetblockedbyspamfilteringorattachmentfiltering,andE-maildoesn’treallyworkforsharingstructured(database)data.

Page 8: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

ThepointisthatE-mailworksreallywellincertainsituations,butthereareotherthingsthatitjustdoesn’tdoverywell.Thesamecanbesaidforothermethodsofsharingdata.Takesocialmediaforexample.MostofmyeditorsareonFacebook,butI’mnotexactlyinclinedtogetmynextarticletotheeditorbypostingitscontentonFacebook.Amoreprivatemediumisbettersuitedtothatparticulartask.

WhenIwasakid,myfatherusedtotellmethatitisalwaysimportanttousetheright

toolforthejob.OfcourseatthetimeIwasaMacGyverwannabeandwasalotmore

interestedinimprovising.AsIhavegottenolderhowever,Ihavecometounderstandthewisdomofmyfather’sadviceandalsorealizethattheconceptofusingtheright

toolforthejobisvitaltosuccessintheworldofIT.

Similarly,socialmediasitescansometimestake,shallwesay,certainlibertieswithyourdata.Lastweekforexample,IwasinCanadaflyingaseriesofmicrogravityflightswiththeCanadianNationalResearchCouncil.Sincebeingweightlessisn’tsomethingthatmostpeopledoallthetime,oneoftheguysthatIwasflyingwithcompiledsomeofthevideofootageandpostedittooneofthesocialmediasites.Thevideowasrecordedin4Kandlookedgreat.Oncepostedhowever,thesitedownsampledthevideoinanefforttoreduceitsfilesize.Theendresultwasagrainy,somewhatdistortedvideowithalowframerate.Thepointisthatifyouaremakingdataavailabletoothers,thenyouwantthedatathattheyreceivetobeidenticaltowhatyousent.

FileSharingOptions(from80’stotoday)Filetransfershavebeenapartofcomputingsincetheverybeginning.Evenwaybackinthe1980s,therewerefilecopy

Page 9: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

toolsbakedintotheWindowsoperatingsystem.IvividlyrememberasachildusingDOSfunctionssuchastheCopycommandorMicrosoft’sDiskCopytool.ThepointisthattheneedfortransferringfilesfrompointAtopointBhasexistedfordecades(backthenmanyfilecopiesoccurredoffline,usingremovablemedia),andcountlesssolutionsexistforaddressingthisneed.Tothisday,MicrosoftstillbakesfiletransfertoolsintotheWindowsoperatingsystem,buttherearealsoplentyofthirdpartytools,mostofwhichhavecapabilitiesthatfarexceedthoseofthenativeOStools.

IrememberthefirsttimeIheardtheterm‘sneakernet’todescribethephysicaltransferofelectronicinformationusing(atthattime)

floppydisks.Thesedayswehavemoresophisticatedmeans(USBsticks)butthe

termstillapplies!

Therearetwomainthingsthatyouneedtoknowaboutthirdpartyfiletransfertools.First,therearemanydifferentwaysoftransferringfiles.Assuch,filetransfersoftwarecanbecategorizedbasedonthefiletransfermethodthatisbeingused.

Theotherthingtounderstandisthateachvendorhasitsownwayofdoingthings.Eventhoughtwoproductsmighttakethesamebasicapproachtofiletransfers,atleastsomeofeachproduct’sfeaturesareprobablygoingtobeunique.Theremayalsobesignificantdifferencesbetweenotherwisesimilarproductsthathavenothingtodowiththefeatureset.Forinstance,ProductAmightuseamoreefficienttransferalgorithmthanProductB.Similarly,ProductBmightbemoresecurethanproductA.Thepointisthattherecansometimesbemajordifferencesbetweenseeminglysimilarfiletransfertools.

Page 10: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

Forthepurposesofthisbook,Iamgoingtoavoiddoinganysortofheadtoheadvendorcomparison.Theresimplyisn’tenoughspaceinashortbooktoobjectivelycomparealloftheleadingfiletransferproducts.Soratherthangetintoaproductspecificdiscussion,Iwantinsteadtotaketheopportunitytodiscussthevarioustypesoffiletransfersoftwarethatcurrentlyexist.AsIdo,Iwillmakeitapointtotalkaboutwhateachtypeisgoodfor,andnotsogoodfor.

Cloud-BasedSharing

OneofthemostcommonmethodsofgettingafilefrompointAtoPointBistousecloudstorageasanintermediary.Therearemanysuchservicesavailable.SomeofthemorepopularonesincludeMicrosoftOneDrive,GoogleDrive,andDropBox.Technically,cloudstorageisn’tthesamethingasfiletransfer,butthetwokindofgohandinhand.

Let’ssupposeforamomentthatsomeoneneedstosendalargefiletoafriend.Ratherthantransferringthefiledirectly,theycouldoptinsteadtouploadthefiletoaclouddrive,andthensharethefilewiththeirfriend.Therecipientofthefilecouldthenusethefile’sURLtodownloadthefile.Soeventhoughcloudstorageisn’treallythesamethingasafiletransfer,cloudstoragedoesenableatwo-step(uploadanddownload)transfer.

Likeanythingelse,usingcloudstoragetotransferfileshasitsgoodpointsanditsbadpoints.Ontheupside,manyofthecloudstorageproviderswillgiveusersfreestoragespace.Forexample,MicrosoftgivesOneDriveusers5GBoffreestoragespace.

AnotherbenefittousingthepubliccloudasamechanismfortransferringfilesisthatcloudstorageproviderssupportlargerfilesthancanbegenerallytransferredthroughE-mail.ManyE-mailaccountshaveanattachmentsizelimitof25MB,althoughsomearefarmorerestrictive.Cloudstoragemakesiteasyto

Page 11: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

circumventE-mailattachmentsizelimits.Betterstill,becausecloudstorageisoftenaccessiblethroughaWebinterface,neitherthesendernortherecipientarelikelytoneedanyspecialsoftwarebeyondaWebbrowser.

Ofcoursecloudstoragedoeshaveitslimits.Onedisadvantagetousingcloudstorageisthatfreestorageinthecloudmayprovetobeinadequatefortransferringlargefiles.Letmegiveyouanexample.

AmomentagoImentionedthatMicrosoftwillgiveOneDriveusers5GBoffreestorage.Admittedly,that’splentyofspacefortransferringpictures,documents,andthatsortofthing.Itmighthowever,beinadequateforthosewhoneedtotransfervideo.

Aspreviouslymentioned,IspentsometimeinCanadalastweekdoingzerogravityresearch.Overthecourseofaweek,Ifilled24memorycardswithvideo.Thosecardswere32GBeach.Itherebyaccumulatedover700GBofvideodata.Thesheervolumeofthedatacompletelyruledoutanychanceofusingfreecloudstorageasamechanismforsharingthedatawithotherswhowantedacopy.OneDrive’s5GBlimitwouldnotevenbegintoaccommodatethevideodatafromasinglecamera,muchlessall24.

Ifyouareonlytransferringtext,thenthe5GBlimitmightnotinitiallyseemlikeanissue.Afterall,manydocumentsarelessthan1MBinsize.Eventhisbook,withimagesandall,onlyconsumesabout5MBofspace.Inspiteofthemodestamountofspacerequiredforstoringdocuments,a5GBlimitcouldquicklybecomeproblematicifyouaretransferring1000recordsaday,orifyouaresharingthe5GBofspacewithallofyourcoworkers.

Therearealsoprivacyissuesthatmustbeconsidered.Ifyouuploadasensitivedocumenttoacloudportal,thenanyonewithaccesstotheportalcouldconceivablydownloadthe

Page 12: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

document.Abettersolutionisusuallyrequiredformakingsurethatsensitiveorregulateddataisonlyaccessiblebytheintendedrecipient.

FTP

AnotherpopularoptionfortransferringfilesisFTP.FTPstandsforFileTransferProtocol.ItisadatatransferstandardthatisasoldastheInternetitself.Whileitiseasytodismisslegacytechnologiesasirrelevant,FTPisstillverymuchaliveandwell.Infact,whenIwrotemylastbook,thepublisherhadmesubmitthemanuscript,accompanyinggraphics,andsomepromotionalvideosviaFTP.

Personally,ItendtothinkoftheFTPprotocol’sageasoneofitsgreatestassets.BecauseFTPhasbeenaroundforsolong,itisuniversallysupported.Furthermore,theprotocolhasbeenprovenoverthecourseofseveraldecadestobestableandreliable.

Therearehowever,acoupleofdisadvantagestotransferringfilesbywayoftheFTPprotocol.ThebiggestdisadvantageisthatFTPfiletransfersrequireacomputertoactasanFTPserver.Thisisn’taproblemwhendataissharedaspartofanon-goingrepeatablebusinessprocessbecausetheserverprovidesthebenefitofcontrol,security,auditinganddataretention.Allgoodthings.ThesemaybenecessaryforSLA’s,complianceandsoforth.However,thismaybeanissuewhenthetransferismore‘adhoc’orevenfrequentbutnotscheduledandnotsubjecttoSLA’s.Wherethingsbecomeproblematicisiffiletransferneedstooccurbetweenindividuals.Letmeexplain.

WhenIwasakidgrowingupinthe80s,mostpeoplethatIknewhadneverheardoftheInternet.Thoseofuswhospenttimeonlinedidsobyusingmodemstodialintoremotehosts.Thosehostscameintwodifferentflavors–publicandprivate.Thepublichostswere,atthetime,referredtoasBulletin

Page 13: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

BoardServices(BBSs).ImaginehavingtodialindirectlytoaWebsiteratherthandialingintotheInternetandthennavigatingtoyourWebsiteofchoice,andyoucanbegintogetafeelforwhatitwasliketouseaBBS.

Theotherconnectivityoptionwaspeertopeer.Withabitofpre-planning,itwaspossibletodialintoafriend’scomputerandestablishaprivatesession.Youcouldusethesesessionstochat,ortotransferfiles.TheclientsoftwarethatmyselfandmyfriendsusedbackthensupportedFTPfiletransfers(amongotherstandards).Assuch,itwasrelativelyeasytosendafiletoafriendviaFTP.

Aspreviouslymentioned,FTPisstillwidelyusedtoday.Inmostcaseshowever,theclientcomponentisjustthat–aclient.TheassumptionisthattheclientwillconnecttoadedicatedFTPserver,liketheonethatmypreviouslymentionedpublisheruses.MostmodernFTPclientsdonotsupportserverless,peertopeerfiletransfers.

TheotherdisadvantagetoFTPisthatbecauseoftheprotocol’sage,FTPissomethingofano-frillsprotocol.FTPdoesagreatjobofcopyingdatafrompointAtopointB,buttheprotocolislackingwhenitcomestosecurity,auditlogging,andthatsortofthing.Thisisn’ttosaythatanFTPsessioncannotbesecuredandaudited,butratherthatthosetypesoffunctionstendnottobenativetotheFTPprotocol.Thatbeingthecase,auditing,security,andotherfunctionsarehandledasfunctionsoftheFTPserversoftware,theclientsoftware,orboth.JustkeepinmindthatalthoughFTPisastandardprotocol,FTPserversandFTPclientscanvarywidelyintermsoffeaturesandcapabilities,soitisimportanttochooseasolutionthatmeetsyourrequirements.

BitTorrents

Anotheroptionfortransferringfilesistouseabittorrent.IhavetobehonestwithyouandtellyouthatIconsiderednot

Page 14: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

writingaboutthisparticulartechnologybecausebittorrentshavegottenareallybadreputationinrecentyears.Evenso,thisreputationstemsfromhowthetechnologyisusedratherthanfromproblemswiththetechnologyitself,soIdecidedtogoaheadandincludeasectiononbittorrents.

Abittorrentisapeertopeerfilesharingprotocol.Thethingthatmakesabittorrentdifferentfromotherformsofpeertopeerfilesharingisthatthistechnologyisdesignedtoworkacrosslargenumbersofcomputers.Generallyspeaking,eachofthesecomputersactsasbothaclientandaserver.

Supposeforamomentthatyouwantedtodownloadaparticularfilefromabittorrent.Youwouldfirstneedtoinstallabittorrentclient,andthensearchforthefilethatyouwanttodownload.Unlikea“normal”peertopeerfilesharingsolutionhowever,thefilewilltypicallyexistinmultiplelocations.Somebittorrentparticipantsthatactasseederswillhavecopiesofthefile,aswillanyonewhohaspreviouslydownloadedacopyofthefile.Dependingontheclientthatyouareusing,youmayhavetheabilitytopickthesourcefromwhichyouwanttodownloadthefile,orthesoftwaremaydownloadthefilethroughaseriesofparalleldatastreamsfromthevarioussources.Thisapproachkeepsanyonesinglecomputerfromhavingtobeartheburdenoftransferringtheentirefile.

Sowhyhavebittorrentsgottensuchabadrep?Well,thereareafewdifferentfactorscontributingtothebittorrent’snotoriety.First,filetransferscanbesomewhatunpredictable.Remember,filesarecommonlyhostedonotheruser’spersonalcomputers,notonsomemassivecloudserver.Assuch,youneverknowwhenabittorrentparticipantmightturnofftheircomputer,haveadropinavailablebandwidth,orevendeletethefilefromtheirharddrive.Asageneralrule,popularfilescanbedownloadedmorereliablythanlesspopularfiles,becausebydefinitiontherearemorecopiesof(andthereforemoresourcesfordownloading)popularfiles.

Page 15: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

Asecondreasonwhybittorrentshavegottenabadreputationisbecausetheytendtobeverylooselycontrolled,andhaveonoccasionbeenusedintheproliferationofmalware.Therehavealsobeeninstancesinwhichhackersexploitedbittorrentclientstogainentryintobittorrentparticipant’scomputers.

Byfarthebiggestreasonwhybittorrentshavegainedabadreputationisbecausetheyareoftenusedforillegalpurposes.Formanyyears,bittorrentswerethetoolofchoice(andinsomecasesstillare)forthosewhowantedtodownloadbootlegcopiesofmusic,movies,andsoftware.RememberwhathappenedtoNapsterbackin2001?Well,thesoftwarethatNapsterusedbackthenworkedverysimilarlytoabittorrent.

Onemoredisadvantagetobittorrentsisthegenerallackofprivacy.Becausebittorrentsdistributedataacrossnetworkpeers,theyarenotusuallysuitablefortransferringdatathatneedstoremainprivate.

Inaddition,manyBittorrentclientsexposeaparticipant’sIPaddresstothosewhoareseedingordownloadingdatacopies,whichcanposeamajorsecurityrisk.Infact,ithasbecomecommonforBittorrentuserstoleverageVPNsoftwareinanefforttoobscuretheirIPaddress.

E-Mail

Ithinkit’ssafetosaythattheaveragepersoniswellfamiliarwithE-mail,sothereisnoneedformetoexplainwhatE-mailisandwhatitdoes.Evenso,IdowanttotakeamomentandbrieflydiscussE-mailasitrelatedtofiletransfers.

Aspreviouslyexplained,E-mailcanbethoughtofasanalmostuniversalplatformforfiletransfersbecausealmosteveryonehasatleastoneE-mailaccount.However,E-maildoeshavethreemajorlimitations.

Page 16: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

First,asImentionedearlier,mostmailboxeshaveanattachmentsizelimit.Thesizelimitisusuallysetbytheadministrator,exceptinthecaseofpublicmessagingplatformssuchasHotmail,Yahoomail,andGmail.Typically,thesizelimitisabout25MB,butthelimitcanbealotlower.IhaveeditorswhoIhavetroublesendingdocumentsto,becausetheirmailboxeshavea5MBlimit.

Evenifyouhaveamailboxwithnoattachmentsizelimit,usingE-mailasafiletransferplatformcanstillbetricky,becauseoddsarethatanyoneyoumightbesendingamessagetowillhaveanattachmentsizelimitontheirownmailbox.

AsecondlimitationthatcangetinthewayofusingE-mailasafiletransferplatformisthemailboxquota.Allofthosemessagesthatgetsentbackandfortheverydayhavetobestoredsomewhere,andifleftunchecked,themailboxdatabasecangrowtobesolargethatitexceedstheunderlyingphysicalstoragecapacity.Assuch,administratorsoftenplacequotasonmailboxestokeepthosemailboxesfrombecomingtoolarge.Evenifstoragespaceisn’tanissue,someorganizationsusemailboxquotastolimitmailboxsizesinanefforttokeepbackupssmallandmanageable.

Thereareanumberofotherreasonswhymailboxquotasaresometimesused.Theimportantthingtounderstandisthatmailboxquotasregulatethemailboxsize,nottheattachmentsize.Therefore,ifamailboxquotaexists,thenitwilllimitthemaximumsizeofanymailboxestowhichitapplies.Thismeansthatifsomeonesendsyouafile,thenthemessagecouldberejectedasaresultofaquotaviolation,eveniftheattachmentitselfisconsiderablysmallerthantheattachmentsizelimit.

OnemorereasonwhyE-mailisimpracticalforuseasafiletransferplatformisbecauseE-mailisinsecure.Really.EventhoughITprosworkreallyhardtosecuremailserversandusermailboxes,messagesareoftensentacrosstheInternetinanunencryptedformat.Nowthereareobviouslyexceptionsto

Page 17: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

therule,butmanymailsystemsdonotencryptE-mailmessagessentacrosstheInternet.ThismeansthatE-mailisapoorchoiceforsendingmessagescontainingsensitiveattachments.

E-mailcanbeespeciallyproblematicfororganizationsthataresubjecttoregulatorycompliance.HIPAAforexample,imposesseverepenaltiesfortheunauthorizeddisclosureofelectronicprotectedpatienthealthinformation.SendingpersonallyidentifiablemedicaldatathroughE-mailrisksunwanteddataexposure.Notonlymightthemessagebeinterceptedintransit,buttherecipientcouldconceivablyforwardthemessagetosomeoneelse.Agoodfiletransfersolutionshouldensuredatasecurity,andallowthedata’sownertoretainverifiablecontrol(throughaccesslogs)overaccesstothedata.

Page 18: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

ModernFileTransferSolutionRequirements

Movingfromthepasttothepresent(andpossiblefuture)forfilesharing,let’slookatnext-genfiletransfersoftwaretohelpusgobeyondthelimitsofFTP,bittorrent,emailandsoforth.Andlet’salsomapoutwhatkindsofrequirementsyoumighthaveandneedforyourcurrentfiletransfersolutionwithinyourbusiness.

NextGenerationFileTransferSoftwareAspreviouslydiscussed,FTPworksreallywellasafiletransfermechanism,buthasitslimitations.BecauseFTPwascreatedseveraldecadesago,itwasn’treallydesignedtohandletoday’sfiletransferchallenges.SomevendorshavecreatedFTPservers

Page 19: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

andFTPclientsthatprovidemodernsecurityandcompliancebeyondwhatisnativelyprovidedbytheFTPprotocol.Othervendorschooseinsteadtobasetheirfiletransfertoolsaroundmodernprotocolsandmodernsecurityandcompliancestandards.

RegardlessofwhetherafiletransferapplicationisbasedonFTPorsomeotherprotocol,therearesomefeaturesthatyoushouldlookforbeyondthebasicabilitytomovefilesfrompointAtopointB.

SecurityandCompliance

Firstandforemost,thesoftwareneedstobeabletotransferfilessecurely.Inmanycaseshowever,thesecuretransferofdataisnotenoughbyitself.Thisisespeciallytrueforthosewhoworkinregulatedindustries,wheretheremaybesevereconsequencesfortheimproperhandlingorunauthorizedexposureofdata.Infact,regulationscommonlyrequireorganizationstobeabletoprovethatfiletransfershappenedsecurely.Itmayalsobenecessaryforanorganizationtoprovethatafilewastransferredbyanauthorizedsendertoanauthorizedrecipient.

Theonlywaytoguaranteethislevelofregulatorycomplianceisthroughanaudittrail.Assuch,thesoftwareneedstosecurelyloginformationaboutthesender,recipient,andcontentofeachtransfer.Theorganizationmustbeabletoproducethisdataintheeventofacomplianceaudit.

Althoughasoftwaregeneratedauditlogshouldbeconsideredtobeanessentialfeature,theauditlogmaynotbeenoughtoensureregulatorycompliancebyitself.Somesetsofregulationshaverequirementsforhowtheauditlogistobehandled.Ataminimum,theorganizationmustusuallyensurethattheauditlogremainssecureandisnottamperedwith.

Dependingontheregulationsthatyourorganizationissubjectto,theremaybearequirementforanauditortobeableto

Page 20: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

reviewtheauditlogs.Insuchsituations,itisimportantforthefiletransfersoftwaretoprovidesecure,authenticatedaccesstothelogsthrougheitherasearchengineoraneDiscoveryportal.

ServiceLevelAgreements

AfiletransferrequirementthattendstobeeasytooverlookisadherencetoServiceLevelAgreements(SLAs).It’stemptingtothinkofSLAsintermsofworkloadavailability,buttheremaybeotherSLArequirementsdependingontheorganization’soperationalrequirements.Forexample,theremaybeanSLArequirementtotransferafiletoapartnereverymorningby8:00AM.

AdherencetothistypeofSLArequirestwothingsfromafiletransferapplication.First,thefiletransfersoftwaremustmaintainalogofanyandalltransferoperations.HavingsuchalogistheonlywaytoproveadherencetoanSLA.

TheotherthingthatisusefulformaintainingcompliancewithafiletransferSLAisanautomationengine.Ifthereisastrictrequirementfortheorganizationtotransferafiletosomeoneataspecifictime,thenthebestwayofmeetingthatrequirementistoremovethepotentialforhumanerrorbyschedulingthefiletransfer.Ideally,filetransfersoftwareshouldbeabletosupportscheduled(orevenscripted)uploadsanddownloads.

UniversalCompatibility

Throughoutthisshortbook,Ihavetalkedaboutseveraldifferentoptionsfortransferringfiles.Eachoftheseoptionshaditsprosandcons,buttherewasonethingthatallofthemethodshadincommon.Noneofthemaretrulyuniversal.

Nowadmittedly,Istatedearlierthat“E-mailcanbethoughtofasanalmostuniversalplatformforfiletransfersbecausealmosteveryonehasatleastoneE-mailaccount”.Ifweare

Page 21: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

definingauniversalplatformasbeingsomethingthatalmosteveryonehasaccessto,thenyes,E-mailprobablyistheclosestthingthatthereistobeingauniversalfiletransferplatform.

Ifyoulookatthingsanotherwayhowever,thenthereisnothingatalluniversalaboutE-mail.Thinkaboutit…Youcan’tE-mailafiletoanFTPserver.Acloudstorageproviderisn’tgoingtousetheSimpleMessageTransferProtocol(SMTP),theprotocolusedbyE-mailservers,totransferafilethatyouareabouttodownload.

WhileitistruethatE-mailisuniversalinthesensethatmostpeoplehaveanE-mailaddress,E-mailisnotuniversallycompatiblewithotherfiletransfermethods.

Believeitornothowever,therearefiletransfertoolsonthemarketthatcomeclosetobeingtrulyuniversal.IhaveseenconsolidatedfiletransfertoolsthatsupportFTP,E-mail,fileservers,networkshares,andmore.

This“SwissArmyknife”approachtofiletransfersisundeniablyconvenient,butimaginehowpowerfulthistypeofuniversalcompatibilitycouldbeifitweretobecombinedwithaschedulerorascriptingengine.Thesoftwarecouldautomaticallytransferfilesonascheduledbasis,usingthemethodthatispreferredbytherecipient.Thinkofitthisway.Iwritebooksandarticlesforaliving.SomeofmyeditorsprefertoreceivemanuscriptsthroughE-mail.OthersrequiremetosubmitmycontenttoanFTPsite.Atoolthatsupportsscheduledtransfersandmultipletransfermethodscouldhelpmetomakesurethatallofmycontentissubmittedontime,andusingthepublisher’spreferredtransfermethod,allwithaminimalamountofeffortonmypart.Icouldsimplycreatefolderscorrespondingtoeachofmypublishers,andthenscheduleatasktouploadthecontentsofeachpublisher’sfoldertothepublisheronascheduledbasis.Ifforinstance,apublisherrequiredcontenttobesubmittedeveryMondaymorning,Imightsetupatasktotransferthecontentsofthat

Page 22: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

publisher’sfolderonSundaynight.AllIwouldhavetodothenistowritethecontent,anddropthefileintothedesignatedfolder.Thesoftwarewoulddotherest.

I’mguessingthatmostofyouprobablyaren’tdealingwithpublishersonaregularbasis,andthat’sOK.Thesamebasicconceptappliestoanyorganizationthattransfersfilestoexternalentities.Considerforexample,anITshopthatistransferringfilestooutsourcedproviderssuchasapaymentclearinghouseorperhapstoabusinesspartner.Havingatoolthataccommodatesallofthesewithasingletransferengine,automationtoolandauditlogcanprovidehugebenefits.

Asyoucansee,therearemanydifferenttypesoftoolsfortransferringfiles.Eachclass

oftoolshasitsadvantagesanddisadvantages.Regardlessofhowyoudecidetogoabouttransferringfiles,thetransfer

shouldbesecure,reliable,anditmustadheretoanyrequirementsthathavebeenestablishedfortheorganization.

Ultimately,tohaveasolidmethodologyforsharingdatayouneedtomapoutafewkeypoints.Thesemaynotallapplyinyourcasebuttheywillformost.Notethefollowing:

EstablishingCriteriaforSuccess

Aspreviouslynoted,therearecountlesstechniquesforsharingdata.Sinceitisimpossibletoexploreeveryconceivablemethod,let’snarrowdownthediscussionandtalkaboutfiletransfers.Let’sassumethatunstructuredfiledataneedstobecopiedfrompointAtopointB,anddefinesomerequirementsfortheprocess.

Page 23: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

TheSoftwareMustBeReliable

Itmightsoundabitcliché,butthefirstrequirementisthatthesoftwarejusthastowork.FiletransfersoftwaremustbeabletoreliablycopydatafrompointAtopointB,withoutthesoftwarecrashingmid-stream,andwithoutthedatabecomingcorruptedintransit.Sayingthatthesoftwareneedstobereliableissuchanobviousthing,thatitalmostgoeswithoutsaying.Evenso,reliabilityisofsuchparamountimportancethatitisworthincludingintheestablishedcriteriaforsuccess.Formanyorganizations,filetransfersarekeyoperationalprocessesrelatedtobusinessfunctionssuchasbillingorcustomerservice.Ifthesoftwaredoesnotwork,thenthebusinesssuffers.

SupportabilityisanAbsoluteRequirement

Asecond,almostequallyimportantrequirementisthatthesoftwareneedstobesupported.Thisrequirementneedsabitofexplaining,sostickwithmeforamoment.

Overtheyears,Ihaveusedsomereallygreatopensource,freewarefiletransfertools.Thesetoolstendtobefeaturerich,andyoudefinitelycan’targuewiththeprice.Evenso,Idon’tusethosetoolsbecausetheytendnottobesupported.

Manyyearsago,Iadoptedapolicyofneverrunningunsupportedsoftwareinproduction.Atthetime,Ihadacorporatejobandsothispracticewasamatterofself-preservation.Ineverwantedtofindmyselfinthepositionofhavingtoexplaintothebossthatwecouldn’tgettechsupportonapieceofsoftwarebecauseIhaddecidedtousefreeware.

Althoughtheconceptoffreesoftwareisundeniablyappealing,Ithinkthatitisbettertospendafewbuckstohavetheassurancethathelpwillbeavailableifyoueverneedit.TothisdayIstillmakeitapointtoneverrununsupportedsoftwareinproduction,eventhoughIworkformyself.

Page 24: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

TheSoftwareShouldBeFeatureRich,ButAffordableandEasytoUse

OK,thisoneisatoughone.Ideallythefiletransfersoftwarethatyoudecidetouseshouldbefeaturerich,butisshouldalsobeeasytouse.Affordabilitydoesn’thurteither.Theproblemisthatfeaturerichness,affordability,andeaseofuseareoftenatoddswithoneanother.ToshowyouwhatImean,let’sforgetaboutfiletransfersoftwareforasecond,andjusttalkaboutsoftwareingeneral.

AssomeonewhowritesaboutenterpriseITforaliving,Igettotestdrivealotofdifferententerprisegradeapplications.Inalmosteverycase,theseapplicationsarejampackedwithfeatures,butthefeaturescomeatacost.Usuallyaveryhighcost.EnterpriseITsoftwaredoesnotexactlyhaveareputationforbeingcheap.

ManyoftheenterprisegradeapplicationsthatIhaveusedovertheyearshavealsobeenoverlycomplicatedtouse.Ihaveoftenwonderedifvendorspurposelymaketheirapplicationsoverlycomplexeitherasawayofjustifyingtheapplication’scost,orasawayofsellingsupportcontracts.

Ofcoursenoteveryorganizationisthesizeofalargeenterprise,andtherearevendorsthatmakesoftwarethatistargetedtowardsmallerorganizations.Oftentimes,thissoftwareissimplyawatereddown,“light”versionofthevendor’senterprisesolution.

Admittedly,thesetrendscanmakeittoughforSMBsizedorganizationstofindqualitysoftware.Ononehand,spendingtenmilliondollarsforanapplication,takingayeartoimplementthatapplication,andshippingtheITstaffofftospecialtrainingisn’tgoingtobearealisticoptionforsmallershops.Ontheotherhand,the“light”versionofanapplicationmaybelackingtothepointthatitdoesnotreallymeetanorganization’srequirements.

Page 25: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

Thepointisthatafiletransfertoolshouldideallybeaffordableandeasytouse,butwithoutcompromisingessentialfeaturesinthenameofprice.Needlesstosay,thisisatallorder,buttherearevendorswhodoadecentjobofmeetingallthreeobjectives.

TheSoftwareMustKeeptheDataSecure

Anotheressentialrequirementforfiletransfersoftwareisthatitmustensureprivacyforthedatathatisbeingshared.NowIwillbethefirsttoadmitthatnoteveryfilecontainssensitivedata.Yesterdayforexample,IsentsomeoneacopyofthePowerPointdeckfromoneofmyrecentspeeches.Thespeechwasopentothepublic,andthecontentwasthereforealsosuitableforpublicdistribution.Evenso,Iamstillabigbelieverinkeepingeveryfiletransferprivate.

Myreasonforwantingtoensureprivacyforeveryfiletransferisreallysimple.Itiseasierandlessriskytomakeafiletransfersecurebydefaultthanitistopickandchoosewhetherornotaparticularfiletransferreallyneedstobekeptprivate.Itiswaytooeasytoforgetthatanotherwisebenigndocumentcontainsthatonepieceofsensitiveinformation.It’sbettertosimplyencrypteverythingthantoriskaccidentallycompromisingsensitiveinformation.Thisisespeciallytruewhenyouconsiderthatalargeportionofthedatatransferredbymanyorganizationsisproprietaryorotherwisesensitiveinnature.

TheSoftwareMustMaintainRegulatoryCompliance

Over135countriesenforcestrictregulationsprotectionpersonalinformationfromtheEU’sGeneralDataProtectionRegulation(GDPR),tonumerouscountries’PersonalInformationProtectionActs(PIPAs),totheUS’sHIPAA.Ifyourorganizationissubjecttooneormoreoftheseregulations,thenitisabsolutelyessentialthatyourfiletransfersoftwarebeabletomovedatainawaythatadherestoregulatoryrequirements.

Page 26: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

Sowhatdoesthatreallymean?Well,theexactrequirementsvarydependingonthenatureofthedatathatisbeingtransferredandontheregulationsthattheorganizationmustadhereto.Generallyspeakinghowever,regulatoryrequirementsaredesignedtoensurethattherearenodatabreachesandthatsensitivedataisnotimproperlydisclosed.Itisimportanttokeepinmindhowever,thattechnologychangesmorequicklythanregulationsandbecausenewexploitsareregularlydiscovereditistheoreticallypossibleforanorganizationtobecompliantwithoutbeingsecure.

Forthesakeofillustration,considerwhatregulatorycompliancemeansforhealthcareorganizations.IntheUnitedStates,healthcareorganizationsaresubjecttoHIPAA.HIPAAimposesstiffpenaltiesfortheimproperdisclosureofpersonallyidentifiablehealthdata.Inotherwords,ifmedicaldata(suchasadiagnosis,testresults,etc.)containsthepatient’snameoranydatathatcouldbeusedtofigureoutthepatient’sidentity,thenthatdataisconsideredtobepersonallyidentifiableandisthereforeprotectedbylaw.

Page 27: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

VendorSponsorChapter:IpswitchMOVEit

Someorganizations,likeyours,requiresensitivedatatomoveoutsidetheperimeterofthecompanynetworksimplyaspartofdoingbusiness.Forexample,bankssendoutcheckstobeimaged,andhospitalstakecareofbillingthroughclearinghousesusingpatientrecordsandchargedata.Nomattertheindustryordataset,theveryideaofinsecurelysendingoutsensitiveinformationovertheInternetisbothdangerousandirresponsible.

Whensharinginformationlikethisaspartofbusinessoperations,itneedstobelockeddownaspartofanestablishedprocess.Organizationslargelyuseoneofthreetypesoftoolstogetthejobdone.FTP,cloudsharing,ormanagedfiletransfer.Eachareviableoptionstogetdata

Page 28: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

movedfrompointAtopointB(eachwiththeirownprosandcons),butatthecoreofyourfiletransferneeds,thesolutionusedmustmeetthreerequirements:

1) Thedataneedstoonlybeaccessiblebytheintendedrecipient

2) Youmustbecertainthedatagotthere3) Youmustbecertainthedatahasn’tbeenmodifieden

route

NeitherbasicFTP,norconsumer-basedcloudsharingtrulyensureanyoftheserequirementsaremet.Toachievetruesecurityaroundthetransmission,access,andintegrityofyourdata,ipswitchoffersmanagedfiletransfersolutionstomeeteventhemostdemandingcustomerneeds.

Attheircore,ipswitch’sfiletransfersolutionsaimtosecurethetransferofyourorganization’smostsensitivefilesbyprovidingyouwithvisibilityintodatamovement,whileretainingcompletecontrol.

Ipswitch’sSecureInformationandFileTransfersolutionofferingismadeupof6differentproducts,providingadditionalfunctionalityandcontroloverdatabasedontheiraward-winningMOVEitTransfer.

MOVEitTransfer

OrganizationsreliantonfiletransferactivitiesneedawayforITtomaintaincompletevisibilityandcontroloverfiletransferactivitiesbetweenusers,systems,partners,andcustomers,whileallowingthoseinvolvedtoinitiatetransferswithoutthehelpofIT.MOVEitTransferprovidesorganizationswiththeabilitytodefinewhatfiletransferactivityisallowed,whocanperformthetransfers,when,andhow.Usingacentralized,

Page 29: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

multi-tenantarchitecture–designedwithmulti-companydatatransferinmind–MOVEitTransferfacilitatessecuretransfersthatadheretocompanypolicyeverytime.

SupportingawiderangeofclientsgoingwellbeyondjustFTPapplications,MOVEitTransferallowsforuserstocontinuetoutilizetheapplicationstheyalreadyknowandlovewhilecontainingtheactualtransfers.MOVEitTransferperformstheactualtransfer,parsingrequeststhroughitspolicyenginetoensuretransfersareallowed,establishesFIPS140-2validatedAES-256encryptionoverthesecurechannel,andgeneratesanaudittrailforeachandeveryfiletransfer.Logsarestoredinatamper-evidentdatabase,helpingorganizationstobeincompliancewithavarietyofdataprivacyregulationsincludingHIPAA,PCI,GDPR,andmore.

Partofafamilyofproductsthatworktogether,MOVEitTransfer’sbasefunctionalityisaugmentedtoincludeagatewaythatproxiesinboundconnectionstofurtherenhancesecurity,automationandAPIsupporttointegrateMOVEitintoexistingbusinessprocesses,andevenOutlook,web,andmobileclientstoallowuserstosharefilessimilarlytoconsumer-basedsolutions,butwiththesecurityandintegrityofMOVEitTransfer.

Page 30: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

MOVEitCloudForthoseorganizationswantingthefunctionalityfoundinMOVEitTransfer,butarecommittedtousingcloud-basedservicesandsolutions,ipswitchoffersMOVEitCloud–aflexibleandscalablecloud-basedmanagedfiletransferservice.SecuredusingthelatestsecurityupdatesandlayersofdefenseincludingFIPS140-2certifiedcryptography,accesscontrol,integritychecking,penetrationtestingandmore,MOVEitCloudprovidesthefullfunctionalityofMOVEitwiththeconvenienceofcloud-baseddeployment.

Despiteitshomeinthecloud,MOVEitCloudmeetsthesamestrictdataprivacycompliancerequirementsasitson-premisescounterpart.

WhichOne’sRightForYou?

Likemostsolutionsthathaveacloud-basedoffering,MOVEitCloudprovidessomeoftheexpectedadvantages,suchasrapiddeployment,predictablecosts,andreliabilitywith99.9%uptime.WherechoosinggetsabitmorechallengingiswhenyoufindoutthatthemajorityofthefunctionalityfoundinMOVEitTransferisalsostandardinMOVEitCloud.So,thismaycomedowntomoreachoiceofcapexvsopex,orcomfortlevelwithhavingpotentiallysensitivedatainthecloud.

SecureFilesinTransitandatRestwithipswitchWhateveryourfiletransferneed–whetherinfrequenttransfersbyonlyafewpeople,ordataconstantlyinmotionbycountlessusers–MOVEitTransferandMOVEitCloudbothprovideorganizationswithcompletevisibilityandabsolutecontroloveryourfiletransfers,ensuringsecureandcompliantdatamovementfororganizationsofanysizeandvertical.

Page 31: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

NeedBackCoverAD

BackinsidercoverAd:A5"by8"highqualityJPG(5.5x8.5"allowingfora.5"bleed)Colorschemeisyourchoice(pantone,RBG,CMYK)

ClicktheAdabovetorequestyourfreetrial.

Page 32: CONVERSATIONAL FILE TRANSFERS AND DATA SECURITY · Greetings Earthlings! When it comes to the world of IT, there are a few philosophies that seem to be universally true. No, I’m

BACKCOVERBEINGWORKEDON

NOTHING NEEDED