Secure network protocols

For a very long time, having devices just work on a network was a feat in itself. This meant that the protocols involved didn’t necessarily need to be secure, they just had to work. Even years after this mentality started to change to support more secure protocols, we still find ourselves in situations where a significant number of devices come out of the box with everything turned on- secure and unsecure- until the users finish their configurations and such down what they don’t need.

As a result, this means that some protocols have stayed around a lot longer than they really should have, because there’s nothing actively forcing organizations to change other than best practices. Today we’re going to be going over a list of unsecured network protocols, and secure network protocols that can be used to replace them.

Instead of FTP, useā€¦ SFTP or FTPS?

FTP (File Transfer Protocol) has been around for 50 years now, and has seen support for it removed from most major browsers. While dedicated command line and GUI based programs still exist and will very likely continue to exist for the foreseeable future, derivatives have long since been available with significantly

Read More: