{"id":44514,"date":"2021-03-03T03:37:00","date_gmt":"2021-03-03T08:37:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=44514"},"modified":"2021-03-03T03:37:00","modified_gmt":"2021-03-03T08:37:00","slug":"a-guide-to-securing-enterprise-document-management-solutions","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2021\/03\/03\/a-guide-to-securing-enterprise-document-management-solutions\/","title":{"rendered":"A Guide to Securing Enterprise Document Management Solutions"},"content":{"rendered":"\n<p>In a training session I was holding just this week, we were discussing the fact that one of the principal benefits of implementing a <strong>Document Management <\/strong>system is the <strong>security <\/strong>it affords your content.  That is assuming of course it is setup correctly.  Sometimes, no so much so be aware.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>The first question to ask when reviewing security of <strong>document management<\/strong> is, \u201cwhat are the most vulnerable elements of the system?\u201d<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2015\/01\/12\/17\/40\/padlock-597495__340.jpg\" alt=\"\" width=\"661\" height=\"445\"\/><\/figure><\/div>\n\n\n\n<p>Has your organization opted to allow employees to access your DMS via their personal mobile devices? If so, this will probably be a primary area of vulnerability and an excellent place to start improving <strong>security<\/strong> measures.<\/p>\n\n\n\n<p>In any case, vulnerabilities are likely to be found at any point or instance where your employees:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Enter data into documents<\/li><li>Share or transfer documents<\/li><li>Access documents to work on them<\/li><\/ul>\n\n\n\n<p><strong>Security<\/strong> vulnerabilities can also exist in document storage locations, making this another critical area to scrutinize and fortify with tighter <strong>security<\/strong> if necessary. <strong>Security<\/strong> Requires Ownership<\/p>\n\n\n\n<p>Following your assessment of DMS security vulnerabilities, the next step should be to decide who will take ownership of improvements and ongoing security management in your organization. Regardless of your enterprise\u2019s scale, document security needs somebody to own it and be accountable for keeping measures up to date and relevant.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.finextra.com\/blogposting\/19920\/a-guide-to-securing-enterprise-document-management-solutions&amp;ct=ga&amp;cd=CAEYACoTNTM5NDA2MDgxODIxNDYxNjYxODIaMzZiOTI5YTYxOWVhYzc0Njpjb206ZW46VVM&amp;usg=AFQjCNFWTxy2RUubjY8axPMPBpDHZKZ06A\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a training session I was holding just this week, we were discussing the fact that one of the principal benefits of implementing a Document Management system is the security it affords your content. That is assuming of course it <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2021\/03\/03\/a-guide-to-securing-enterprise-document-management-solutions\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[4,14],"tags":[163,150],"class_list":["post-44514","post","type-post","status-publish","format-standard","hentry","category-document-management","category-security","tag-document-management","tag-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/44514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=44514"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/44514\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=44514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=44514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=44514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}