PDFs beat almost every other kind of document when it comes to security. But which methods are available, and which ones should you integrate into your workflow? BEST WAYS TO SECURE YOUR Turn on TRUST MANAGER in your PDF reader to guard against malware from malicious PDF documents. Verifies the authenticity of the signee and the integrity of the signed document. PERMANENT REMOVAL of visible text and images. If you’ve ever read a government report, you’ve probably seen redaction in practice. Watermarks, headers and footers all indicate the LEVEL OF CONFIDENTIALITY a document should have. However, this method depends on people enforcing the security, as there’s no mechanism inside the document to prevent those who shouldn’t see it from being able to view it. Two main types of encryption, PASSWORD and DIGITAL, can help secure your PDFs. Enables CONTROL OF APPROVED DOCUMENTS, ensuring that certain changes will not be possible for the document to remain certified. For instance, if your marketing manager has signed off on the next quarter’s plan, you wouldn’t want someone changing a budget item, so document certification controls what types of changes can be made. TRUST MANAGER DIGITAL SIGNATURE This allows you to remove sensitive information from your document before publishing. DOCUMENT SANITIZATION REDACTION DOCUMENT CERTIFICATION WATERMARKS, HEADERS, FOOTERS ENCRYPTION Two main types of rights management, information rights management and digital rights management, can help keep your documents secure. RIGHTS MANAGEMENT of annualized costs from cybercrime were related to malicious code (1) 23% Online records exposed in 2013 (2) COMMON INFORMATION SUBJECT TO REDACTION: 740 million+ Global losses in 2013 due to phishing alone (5) $ 5.9 billion Social Security numbers Financial account numbers Home addresses Dates of birth Insurance coverage details Medical information PASSWORD: Access available via password only DIGITAL: Access determined by digital certificates INFORMATION RIGHTS MANAGEMENT (IRM): Typically within a company, this includes giving individuals specific rights, which can differ depending on the person. DIGITAL RIGHTS MANAGEMENT (DRM): Protects information after sale, most often consumer-facing, the biggest contemporary example of DRM in practice are paywalls. Encryption using passwords is by far the MOST COMMON, though it is generally less secure than digital certificates. That’s 14 ADULTS EVERY SECOND. (3) More than 1 MILLION people per day SUSTAIN CYBERATTACKS. 20,750 FOR EVERY INTERNET CRIME VICTIMS (4) 1 IDENTITY THIEF WAS CONVICTED 1 in 14 PROGRAMS is later confirmed as malware. (7) Americans who have had personal information stolen by hackers (6) 40 million per year (6) $ 445 billion CYBERCRIME costs the global economy about COMMON ITEMS REMOVED IN SANITIZATION: Metadata Hidden layers Hidden data from previous versions Comments Overlapping objects OF THE POPULATION. (6) 15% That’s about ADDITIONAL SOURCES 1. http://www.statista.com | 2. http://motherboard.vice.com | 3. http://www.microsoft.eu | 4. http://www.infoworld.com 5. http://www.emc.com | 6. http://www.reuters.com | 7. http://blogs.msdn.com =1 million