Foxit PDF Editor Free Trail Download
8 BEST WAYS TO BEST WAYS TO
SECURE SECURE
YOUR YOUR PDF PDF
PDFs beat almost every other kind of
document when it comes to security.
But which methods are available, and which
ones should you integrate into your workflow?

TRUST MANAGER

Turn on TRUST MANAGER in your PDF
reader to guard against malware from
malicious PDF documents.

23% 23%
of annualized costs from
cybercrime were related
to malicious code(1)

REDACTION

PERMANENT REMOVAL
of visible text and
images. If you’ve ever
read a government
report, you’ve probably
seen redaction in
practice.

COMMON INFORMATION
SUBJECT TO REDACTION:

Social Security
Numbers
Dates
of birth
Home
Addresses
Medical
Information
Financial
account
numbers
Insurance
coverage
details
740740
million+ million+
Online records
exposed in 2013(2)

ENCRYPTION

Two main types of
encryption, PASSWORD
and DIGITAL , can help
secure your PDFs.
PASSWORD:
Access available
via password only
DIGITAL:
Access determined
by digital certificates
Encryption using
passwords is by far the
MOST COMMON
though it is generally
less secure than digital
certificates.
More than 1
MILLION
people
per day SUSTAIN
CYBERATTACKS.
That’s
14 ADULTS 14 ADULTS
EVERY SECOND.(3) EVERY SECOND.(3)

DIGITAL SIGNATURE

Verifies the authenticity of the
signee and the integrity of the
signed document.
1 IDENTITY
THIEF
THIEF
WAS CONVICTED
FOR EVERY
20,750
INTERNET CRIME
VICTIMS (4)

DOCUMENT CERTIFICATION

Enables CONTROL OF APPROVED
DOCUMENTS
, ensuring that certain changes
will not be possible for the document to
remain certified. For instance, if your marketing
manager has signed off on the next quarter’s
plan, you wouldn’t want someone changing a
budget item, so document certification
controls what types of changes can be made.
$5.9 $5.9
billion billion
Global losses in
2013 due to
phishing alone(5)

RIGHTS MANAGEMENT

CYBERCRIME
costs the global
economy about
$445
$445
billion
billion
per year (6)
Two main types of rights management, information rights management
and digital rights management, can help keep your documents secure.
INFORMATION RIGHTS MANAGEMENT (IRM):
Typically within a company, this includes giving
individuals specific rights, which can differ
depending on the person.
DIGITAL RIGHTS MANAGEMENT (DRM):
Protects information after sale, most often
consumer-facing, the biggest contemporary
example of DRM in practice are paywalls.

DOCUMENT SANITIZATION

This allows you to remove sensitive information from
your document before publishing.

COMMON ITEMS REMOVED
IN SANITIZATION:
Metadata Comments Hidden
layers
Overlapping
Objects
Hidden data from
previous versions
4040
million million
Americans who have had
personal information
stolen by hackers(6)

That’s about
15% 15%
OF THE
POPULATION.(6)
=1 million

WATERMARKS, HEADERS, FOOTERS

Watermarks, headers and footers
all indicate the LEVEL OF
CONFIDENTIALITY
a document
should have. However, this
method depends on people
enforcing the security, as there’s
no mechanism inside the
document to prevent those who
shouldn’t see it from being able
to view it.
1 in 14 1 in 14
PROGRAMSPROGRAMS
is later confirmed as malware.(7)