Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Coronavirus & Document Security

in Blog, Document Security, DRM, PDF Security

Coronavirus, secure remote working & document security.

The coronavirus, similar future outbreaks and even climate change will change the way society works, with more reliance on remote working.  This makes protecting your documents critical, ensuring they are not exposed to leakage and theft.

 

Coronavirus – changing the way we work

The end result of the Coronavirus is to expose known information security weaknesses when staff are already at full stretch.  The onset of Coronavirus has been swift and silent, like any well experienced Internet virus.  But unlike Internet viruses it travels by touch and through the air trying to infect all it meets to pass the infection on. The responses of our governments in their attempts to fend off this virus are:

  • Containment – identifying who is infected and treat them and their contacts
  • Delay – try to slow down the ability to spread giving longer to fight back
  • Research – find out what we can about how to ameliorate the severity of attack
  • Mitigate – treat who you can for the best effect.

Many countries have now switched to Delay as their favoured policy, and all that varies is the degree of the implementation.  The approach to delaying spread of the virus is to try to slow down the rate at which the virus can spread to something that medical services can cope with.  As far as computers are concerned, moving people away from the workplace to their homes is an essential step, but this is more likely to increase security problems. As more and more people connect to central systems, they use insecure public networks and download sensitive information onto local machines or forward information on to work colleagues – who may or may not be working to the same security standards or are not supposed to have access. This is made more complicated by the difficulties of maintaining a coherent management of anti-virus and spam filtering technologies and allowing connections through VPN that can be observed by hackers.  It is also more difficult to prevent sensitive information from being passed on, unintentionally or otherwise.

Sensitive and confidential document protection

Maintaining control over sensitive and/or confidential company documents is now a necessity.  Encryption only goes so far – protecting documents in transit and at rest – but it cannot prevent users sharing documents with others, stop printing of hard copies, control the locations and devices from where documents can be accessed and used, stop copying of content, etc. etc. ‘Secure’ data rooms and other cloud-based ‘secure’ document collaboration systems are seen as an alternative, but there is nothing to prevent users from sharing login info with others and therefore your documents could still easily be at risk.  And a browser environment can only provide limited security.  These types of system also force you to upload unprotected documents to the cloud – so your documents are exposed if something goes wrong with the encryption process and temporary files are left lying around.

Protection of training course content

Equally affected are the conference and training industries that have previously depended on getting people together for delivering their results.  Now comes a revolution to use electronic distribution for courses and contents, and to move to podcasts, letting all the participants operate from home or office or educational establishments seamlessly. Locklizard is well placed to support the controlled distribution of training and conference materials, allowing presenters and delegates to share information securely, regardless of where they are all located.  We already have many globally based publishers making use of these facilities, whose own customer base is distributed worldwide.  And where courses must be used in locations with poor Internet access, course providers simply distribute a USB device containing protected courses and a secure Viewer to open them.

Social impacts on information and document security

The direct effects of the response to Coronavirus have been to isolate people and to provoke ‘social distancing’ to keep people away from each other.  The impact of this is to move people from face to face situations in favour of purely electronic connections.  Some may argue that the latest generations communicate more by text, social media and email than ever they do by meeting, and they may have a point.  But that will cause a revolution as so much of our interactions are physical and rely upon collecting triggers such as body language or intonation that may be lost in electronic exchanges.  The interactions between a presenter and their audience may also be lost. Another big change comes with distributing materials before meetings (product development, board meeting) or a lecture/training session.  Often these are controlled by being distributed at the beginning of the meeting or lecture or made available from an internal secure location where the information is secret or sensitive.  Now they have to be provided to any number of remote locations for which there are few controls over security.  Documents can be easily passed on by mistake such as responding to unauthorised requests in good faith or forwarding to people because they might be interested. Separating people from their workplace support infrastructure reduces the ability to control what they do with the information they are now using away from the workplace.  This is where DRM can help, for example:

  • restricting access to certain locations
  • restricting access to specific devices
  • stopping users sharing documents
  • preventing printing and screen grabbing of documents (even by remote access)
  • preventing editing and copying of content
  • ensuring content can no longer be accessed after a certain time period
  • revoking access on the fly
  • logging document use

When you have a situation where documents can rather too easily find their way into the wrong hands you need to be able to place controls over the way the documents are used.  Rules need to work by document and not by user as it is the document content that determines use rules.

Changes to behaviour – controlling document access and use

We must never underestimate the impact of changing social engineering on our information systems and information management methods.  Social engineering is already widely used by fraudsters and confidence tricksters in normal office environments (and with the elderly and people subject to stress) to gain access to or control of sensitive information for their own benefit. Much of our security relies upon checks and balances as well as two-person operation and hierarchical authorisation, and computers are used to give effect to decisions.  Obvious controls include stopping use unless the user is specially authorised and identified and preventing sharing and copying of content onto unauthorized devices. DRM controls allow document owners (publishers) to specify the controls to be enforced on everyone who receives their controlled documents, whether authorized or not. Setting strict conditions around data access and use by providing a secure means of content control is one of the main advantages of using DRM for documents. The ability to selectively revoke access when it is no longer required or change permissions on-the-fly is just one of the many ways document DRM ensures that you are always in control of your documents regardless of where they are located. You can no longer rely on physical or organization controls to securely manage content in fragmented structures where central control cannot be exerted.  Embedding DRM controls in your sensitive and commercial information is a required step as the workplace evolves to a Decentralised model.

 

 

Tags: confidential document protection, control document access, control document use, coronovirus, digital rights management, document drm, document protection, document rights management, document security, drm, drm security, protect documents, protecting documents, rights management, secure remote working, sensitive document protection, training course copy protection, training course security
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

Fields marked with an * are required

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Academic Document Protection Link to: Academic Document Protection Academic Document ProtectionLink to: Secure Remote Training Courses Link to: Secure Remote Training Courses Secure Remote Training Courses
Scroll to top Scroll to top Scroll to top