Join our Mailing List

Recent Blog Posts

Newsletter: November 2015

November 29, 2015

November - Volume 5, Issue 11

  • Dealing with the Weakest Link in Your Security: Your Employees
  • The Age of Digital Everything is Here - What Does This Mean for Document Security?
  • Safeguarding Sensitive Financial Data
  • It Was World Paper Free Day - November 6, 2015
Read More

Integrating Security Technologies With Business Systems

November 12, 2015

When you lock up your house for the evening or if you are going away, you make sure that all points of entry are locked. If your home is to be targeted by a thief, they will probably not try the front door, but instead look for a vulnerable spot to enter (maybe the sliding door in the back or an open window if the season permits). It’s well known that in order to keep your family safe from[...]

Read More

It’s World Paper Free Day – November 6, 2015

November 06, 2015

 

We’re taking the pledge to go paper free on World Paper Free Day 2015, and we want you to join us!

The Association for Information and Image Management (AIIM), a global community of information professionals, is taking the initiative to challenge the business world to use less paper and eliminate the waste that office paperwork can create. According to a recent study done by AIIM, 35% of[...]

Read More

Which Industries Are Targeted by Cyber Threats?

October 29, 2015

You hear about these large scale data breaches where another big corporation becomes victim to a cyber-attack. While these news stories seem to be popping up more and more these days, the truth is cyber-attacks are happening all the time and have been for a long time. You may be wondering who these attackers are targeting and why? While the why may not always be clear, we can deduce from[...]

Read More

Newsletter: October 2015

October 28, 2015

October - Volume 5, Issue 10

  • National Cyber Security Awareness Month 2015
  • Which Documents Should You Protect?
  • The Worst Data Breaches in History
  • How Secure is Your Data in the Cloud?
Read More

National Cyber Security Awareness Month 2015

October 22, 2015

"Cyber threats pose one of the gravest national security dangers the United States faces" - Barack Obama.

Sponsored by the National Cyber Security Division of the Department of Homeland Security and the National Cyber Security Alliance, October has been designated National Cyber Security Awareness Month (NCSAM).

Since its inception in 2004, National Cyber Security Awareness Month been helping[...]

Read More

Safeguarding Sensitive Financial Data

October 15, 2015

Chances are your business collects and stores your customers’ personal information. This is especially true if you’re in the financial industry. You may not know, but it is your company’s legal responsibility to ensure that the data collected is handled and stored properly. If your customers become victims of identity theft because of your company’s poor practices, your company will be held[...]

Read More

The Age of Digital Everything is Here – What Does This Mean for Document Security?

October 01, 2015

The age of digital everything is here. People are now able to work from wherever they are and on whatever device they choose thanks to advancements in mobile technology, the cloud and the Internet of Things. The Internet of Things is defined as a network of physical objects (things) that are embedded with software and network connectivity so that the “things” can collect and exchange data.[...]

Read More

Newsletter: September 2015

September 28, 2015

September - Volume 5, Issue 9

  • Responding to a Document Security Breach
  • Why Do Data Breaches Occur?
  • Preventing Document Security Breaches - Toolkit
  • Someone Has Plagiarized My Content - What do I do?
Read More

Dealing with the Weakest Link in Your Security: Your Employees

September 24, 2015

Did you know that 58 percent of data breaches are caused by employees? Just recently, personal data of millions of former students of British Columbia and Yukon was exposed due to mishandling by a government employee. Security breaches have become a common occurrence. In many cases, companies fall victim to coordinated attacks by sophisticated hacker, but often network and data breaches occur[...]

Read More

Video: Web Viewer

September 22, 2015

How to retrieve the secured web link for your protected document to send to your readers. This secured web link directs readers to the web viewer version of your protectedpdf document.

Read More

How Secure is Your Data in the Cloud?

September 10, 2015

Cloud sharing platforms are a popular tool to share and store your documents. Those documents may be safe while they reside in your cloud account, however, have you ever wonder what happens once those files leave the secured space? They become vulnerable and anyone who gets their hands on them will be able to do whatever they want with your content.

Read More

The Worst Data Breaches in History

September 03, 2015

When hackers broke into the Sony networks last November, not only was it embarrassing for several executives (and entertaining for the rest of us), but it also exposed a problem that is all too common these days. Hacking is never going to go away. Hackers will keep getting better and so will the software to prevent them, and so this cycle will go on and on. Your intellectual property and[...]

Read More

Which Documents Should You Protect?

August 26, 2015

Not all documents are created with an equal purpose. Some have information that you wouldn’t mind getting released to the public; it might even benefit your company. However, others have highly sensitive data and information that would be damaging without document security. When considering a document protection plan, you’ll first need to determine whether or not your company has data,[...]

Read More

Newsletter: August 2015

August 26, 2015

August - Volume 5, Issue 8

  • How Data Breaches Can Affect Brand and Reputation
  • How Much Does a Data Breach Cost? A Quick Worksheet
  • Safeguard confidential materials stored on laptops
  • Obfuscation or Encryption for Document Security?
Read More

Why Do Data Breaches Occur?

August 20, 2015

Data breaches seem to happening left and right these days, and companies of all different types and sizes are getting targeted. Has there been some sort of uprising of cybercriminals or are these companies just being careless? Let’s take a look at some of the reasons these data breaches occur.

Read More

Someone Has Plagiarized My Content – What do I do?

August 13, 2015
It’s an unfortunate thing, but plagiarism occurs often in today’s digital age. So what can you do if you’ve discovered your content plagiarized? Here are a few tips you can follow if you find yourself in this situation.

Contact the webmaster

Many websites will have contact information for their webmaster. If you’ve discovered your content on someone else’s website, you can ask the webmaster[...]

Read More

Responding to a Document Security Breach

August 07, 2015

Great. The unthinkable has happened to your company. Along with Sony, Home Depot, Target, and Apple, you can add your company to the long list of recent data security breaches. With the overwhelming feeling of dread, sense of loss, and panic, there’s confusion. What do you need to do to take control of the situation? Here are some steps to take in responding to a document security breach.

Read More

Preventing Document Security Breaches – Toolkit

July 30, 2015

A data breach is defined as the unintentional release of secure information to an untrusted environment –also known as a data leak or a data spill. Facebook, LinkedIn, eHarmony, Apple and the US Army have all been victim to such “accidents”. I tend to think that data breach is intentional, and I have numbers to back me up!

Read More

Newsletter: July 2015

July 29, 2015

July - Volume 5, Issue 7

    • Now share encrypted files to Salesforce CRM with Protectedpdf document security
    • 5 Steps to protecting your company's privacy
    • 6 Cyber security tips everyone should know
    • Risk grader helps assess risk for security breach and copyright protection
Read More