File Transfer Protocol (FTP)

20th February 2020 | Cybrary File Transfer Protocol (FTP)


File Transfer Protocol (FTP) is a communications protocol used for transferring or exchanging files between two computers. These transferring of files generally is authenticated by username and password credentials. Anonymous FTP allows users to access files, programs and other data from the Internet without the need for a user ID or password. Web sites are sometimes designed to allow users to use ‘anonymous’ or ‘guest’ as a user ID and an email address for a password. File Transfer Protocol is the Internet standard for transferring or exchanging files from one computer to another using TCP or IP networks.

File Transfer Protocol has largely been supplanted by the more secure and commonly used HTTPS protocol used for web browsing.  FTP can really be thought of as a deprecated protocol not to be used anymore.

Source: Techopedia

Related Readings: Google is Completely Removing FTP Access from Chrome

Should a SMB be using FTP?

Not really. FTP is not a secure protocol to be used by businesses anymore.  It does not encrypt the data transferred over this protocol.  Secure FTP does exist and uses Transport Layer Security to encrypt the file transfer process but this requires a special client which is no longer necessary when Chrome, Firefox, and Microsoft Edge can all transfer files securely.

To learn more about File Transfer Protocol, watch this short 2 minute video:

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

From Fear to Feedback: Report Phishing Channel Works Wonders

From Fear to Feedback: Report Phishing Channel Works Wonders

CyberHoot believes security awareness should feel positive, empowering, and rewarding. Traditional phishing...

Read more
Why Security Culture is Critical — And How CyberHoot Makes It Stick

Why Security Culture is Critical — And How CyberHoot Makes It Stick

In today’s cybersecurity landscape, breaches are rarely caused by a lack of technology. Instead, they stem from...

Read more
Top 10 Emerging AI-Based Threats Every Business Must Prepare For

Top 10 Emerging AI-Based Threats Every Business Must Prepare For

Artificial Intelligence (AI) is transforming productivity and efficiency, but it’s also arming cybercriminals...

Read more