Although file uploads are necessary for employee productivity and for certain websites and web applications to perform their functions, they also offer an attack vector to cyber criminals. By concealing advanced threats that exploit vulnerabilities within common file types, attackers can compromise an end user or an entire system. This white paper will describe the best ways to prevent malicious file uploads while still allowing legitimate users to upload files.