Get an overview of security concerns, including exposure of personal information, loss of revenue, legal exposure, and loss of reputation, specifically a focus on document security.
- [Narrator] You'd almost have to have been living under a rock to not have some awareness of the problems and challenges surrounding information security. For me, there are two big buckets of concern over security in business. The first centers on business assets: protecting proprietary information, intellectual property, financials, business planning and the like. Losing control of this information can present some serious risk to revenue. If your competitors know your next moves, they're going to take advantage of that.
What gets more attention in the media is exposure of personal information. Now this used to mean exposing your clients' identity or credit information to bad actors which opens them up for identity fraud and opens you up for big liabilities, but over the past few years, we've increasingly seen personal information in the sense of private communications like texts and emails being hacked and released in attacks on reputation and credibility. Document security is a subset of the overall security umbrella and has some distinguishing characteristics.
Let's settle on a working definition for document security. I'm gonna say that it's the processes and policies relating to storing, retrieving, and controlling business files throughout their life cycle. That last clause, throughout their life cycle, is one of the special characteristics of document security. These files tend to not live forever. At a certain point, they'll be obsolete, and so, document security also needs to take into account safe archival storage and the ability to retrieve archives if necessary.
As I've said on other occasions, we should probably get used to saying file security. Document still has the connotation to a lot of people for MS Word documents, but what we're really talking about is any file that is used to collect and share company information. That could be a written document, an email, a presentation, a drawing, a video, and so on. This course will focus more on the what and why of document security rather than the how.
I'm not gonna spend a lot of time on individual tools or technologies. My goal is to expose you to some of the concepts and consideration around this topic and help you get started. Of course, when appropriate, I'll be giving you concrete examples, but much of this course will be more theoretical and general.
- Identify the group of people to be notified when making a document policy or procedure change.
- Recognize which types of documentation requires higher levels of security.
- Name the two rights available at folder level during collaboration.
- Recall the purpose of version control.
- Determine which application allows multiple libraries with custom permissions.
- Identify the term used for add-ins within the SharePoint application.
- Explain the most common cause of data breaches.