8
BEST WAYS TO
BEST WAYS TO
SECURE
SECURE
YOUR
YOUR
PDF
PDF
PDFs beat almost every other kind of
document when it comes
to security.
But which methods are available, and which
ones
should you integrate into your workflow?
TRUST MANAGER
Turn on TRUST MANAGER in your PDF
reader to guard against malware from
malicious PDF documents.
23% 23%
of annualized costs from
cybercrime were related
to malicious code(1)
REDACTION
PERMANENT REMOVAL
of visible text and
images. If you’ve ever
read a government
report, you’ve probably
seen redaction in
practice.
COMMON INFORMATION
SUBJECT TO REDACTION:
Social Security
Numbers
Dates
of birth
Home
Addresses
Medical
Information
Financial
account
numbers
Insurance
coverage
details
740740
million+
million+
Online records
exposed in 2013(2)
ENCRYPTION
Two main types of
encryption, PASSWORD
and DIGITAL , can help
secure your PDFs.
PASSWORD:
Access available
via password only
DIGITAL:
Access determined
by digital certificates
Encryption using
passwords is by far the
MOST COMMON
though it is generally
less secure than digital
certificates.
More than 1
MILLION people
per day SUSTAIN
CYBERATTACKS.
That’s
14 ADULTS
14 ADULTS
EVERY SECOND.(3)
EVERY SECOND.(3)
DIGITAL SIGNATURE
Verifies the authenticity of the
signee and the integrity of the
signed document.
1
IDENTITY
THIEF
THIEF
WAS CONVICTED
FOR EVERY
20,750
INTERNET CRIME
VICTIMS (4)
DOCUMENT CERTIFICATION
Enables CONTROL OF APPROVED
DOCUMENTS , ensuring that certain changes
will not be possible for the document to
remain certified. For instance, if your marketing
manager has signed off on the next quarter’s
plan, you wouldn’t want someone changing a
budget item, so document certification
controls what types of changes can be made.
$5.9
$5.9
billion
billion
Global losses in
2013 due to
phishing alone(5)
RIGHTS MANAGEMENT
CYBERCRIME
costs the global
economy about
$445
$445
billion
billion
per year (6)
Two main types of rights management, information rights management
and digital rights management, can help keep your documents secure.
INFORMATION RIGHTS MANAGEMENT (IRM):
Typically within a company, this includes giving
individuals specific rights, which can differ
depending on the person.
DIGITAL RIGHTS MANAGEMENT (DRM):
Protects information after sale, most often
consumer-facing, the biggest contemporary
example of DRM in practice are paywalls.
DOCUMENT SANITIZATION
This allows you to remove sensitive information from
your document before publishing.
COMMON ITEMS REMOVED
IN SANITIZATION:
Metadata
Comments
Hidden
layers
Overlapping
Objects
Hidden data from
previous versions
4040
million
million
Americans who have had
personal information
stolen by hackers(6)
That’s about
15%
15%
OF THE
POPULATION.(6)
=1 million
WATERMARKS, HEADERS, FOOTERS
Watermarks, headers and footers
all indicate the LEVEL OF
CONFIDENTIALITY a document
should have. However, this
method depends on people
enforcing the security, as there’s
no mechanism inside the
document to prevent those who
shouldn’t see it from being able
to view it.
1 in 14
1 in 14
PROGRAMSPROGRAMS
is later confirmed as malware.(7)