article thumbnail

GUEST ESSAY: A primer on content management systems (CMS) — and how to secure them

The Last Watchdog

Chances are strong that your corporate website uses a CMS, and perhaps you have a separate CMS for documents and other files shared by your employees, partners, and suppliers. Security is essential for a CMS. Best security practices. percent of CMS users worry about the security of their CMS—while 46.4

CMS 250
article thumbnail

How to document the scope of your ISMS

IT Governance

If you’re planning to implement an ISMS (information security management system), you’ll need to document the scope of your project – or, in other words, define what information needs to be protected. You should instead document the organisation and its processing under Annex A control A.15 15 – supplier relationships.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: DigiCert Document Signing Manager leverages PKI to advance electronic signatures

The Last Watchdog

Related: Why PKI will endure as the Internet’s secure core. Yet electronic signatures do have their security limitations. Trzupek outlined how DSM allows for legally-binding documents with auditability and management of signers. “It That’s what Document Signing Manager does.

article thumbnail

How to Preserve Your Old Documents While Growing Digitally

AIIM

Taking care of your old documents is a complicated process. On the other, however, when you do need the documents, you need to be able to locate them quickly and not waste hours trying to figure out where they might have ended up. First Off, Handle the Documents with Care.

Paper 125
article thumbnail

How to Send Documents Securely Over the Internet | Onehub

OneHub

There are plenty of ways to send documents over the internet. The problem is that they’re not all secure methods. Email passwords and document privacy settings aren’t always enough. If you handle sensitive data, be it your own or that of your clients or business partners, here’s how to send documents securely over the internet.

article thumbnail

How to document your information security policy

IT Governance

With cyber security affecting businesses worldwide, it is important that all organisations have a policy in place to state and record their commitment to protecting the information that they handle. First, what is an information security policy? Compiling your information security policy. Consider your shareholders.

article thumbnail

How to Eliminate Paper Processes

AIIM

70% of AIIM survey respondents indicate that they plan to expand their efforts to encourage and support more digitally-born documents this year. Access controls and data security make it easier and less expensive to maintain compliance, and reduces the chance of missing documents that could result in lost revenue.

Paper 209