We can all imagine the risks of transferring sensitive files without secure protocols: unauthorized access, data breaches, ...