PDFs beat almost every other kind of document when it comes to security. But which methods are available, and which ones should you integrate into your work�ow?
BEST WAYS TO BEST WAYS TO SECUREYOURSECUREYOUR
Turn on TRUST MANAGER in your PDF reader to guard against malware from malicious PDF documents.
Veri�es the authenticity of the signee and the integrity of the signed document.
PERMANENT REMOVAL of visible text and images. If you’ve ever read a government report, you’ve probably seen redaction in practice.
Watermarks, headers and footers all indicate the LEVEL OF CONFIDENTIALITY a document should have. However, this method depends on people enforcing the security, as there’s no mechanism inside the document to prevent those who shouldn’t see it from being able to view it.
Two main types of encryption, PASSWORD and DIGITAL, can help secure your PDFs.
Enables CONTROL OF APPROVED DOCUMENTS, ensuring that certain changes will not be possible for the document to remain certi�ed. For instance, if your marketing manager has signed off on the next quarter’s plan, you wouldn’t want someone changing a budget item, so document certi�cation controls what types of changes can be made.
TRUST MANAGER
DIGITAL SIGNATURE
This allows you to remove sensitive information from your document before publishing.
DOCUMENT SANITIZATION
REDACTION
DOCUMENT CERTIFICATION
WATERMARKS, HEADERS, FOOTERS
ENCRYPTION
Two main types of rights management, information rights management and digital rights management, can help keep your documents secure.
RIGHTS MANAGEMENT
of annualized costs from cybercrime were related to malicious code (1)
23%23%
Online records exposed in 2013 (2)
COMMON INFORMATION SUBJECT TO REDACTION:
740million+740million+
Global losses in 2013 due to
phishing alone (5)
$5.9billion$5.9billion
Social Securitynumbers
Financialaccountnumbers
Homeaddresses
Datesof birth
Insurancecoveragedetails
Medicalinformation
PASSWORD:Access available via password only
DIGITAL: Access determined by digital certi�cates
INFORMATION RIGHTS MANAGEMENT (IRM):Typically within a company, this includes giving individuals speci�c rights, which can differ depending on the person.
DIGITAL RIGHTS MANAGEMENT (DRM): Protects information after sale, most often consumer-facing, the biggest contemporary example of DRM in practice are paywalls.
Encryption using passwords is by far the
MOST COMMON, though it is generally
less secure than digital certi�cates.
That’s
14 ADULTS14 ADULTSEVERY SECOND. (3)EVERY SECOND. (3)
More than 1 MILLION people per day SUSTAIN CYBERATTACKS.
20,75020,750FOR EVERY
INTERNET CRIMEVICTIMS (4)
11IDENTITYTHIEFTHIEFWAS CONVICTED
1 in 141 in 14PROGRAMSPROGRAMS
is later con�rmed as malware. (7)
Americans who have had personal information stolen by hackers (6)
40million40million
per year (6)
$445billion$445billion
CYBERCRIMEcosts the global economy about
COMMON ITEMS REMOVED IN SANITIZATION:
Metadata
Hidden layers
Hidden data from previous versions
Comments
Overlapping objects
OF THEPOPULATION. (6)
OF THEPOPULATION. (6)
15% 15%That’s about
ADDITIONAL SOURCES1. http://www.statista.com | 2. http://motherboard.vice.com | 3. http://www.microsoft.eu | 4. http://www.infoworld.com
5. http://www.emc.com | 6. http://www.reuters.com | 7. http://blogs.msdn.com
=1 million