Three Ways to Lock Up Document Security

An IT security breach’s impact is too large to ignore. Alarmingly, we are witness – or victim – to the rising tide of technological trauma. From spam to corporate scam, today’s IT breaches raise the bar on what is considered as common crime.

Where once lock, key, and a tight lip was sufficient in protecting important information, today’s interconnected environment demands tighter, more sophisticated measures.

So what can we do to safeguard personal and company data from the unscrupulous?

We spoke with Microsoft MVP and top IT security expert, Orin Thomas, to find answers and he shared three smart practices that each of us can adopt to step up security:

  1. Resist WiFi Wanderlust

People who travel with laptop or tablet computers should avoid connecting to any WiFi access point that they don’t own or that isn’t controlled by the organization. Assessing the security of a 3rd party WiFi access point is almost impossible. Even in a private airline lounge, someone in the seat across from you could be intercepting your network traffic or compromising your computer.

Orin Thomas at Nitro, Melbourne

Orin Thomas at Nitro, Melbourne

  1. Limit Joy on a USB Stick

Avoid storing organizational data on USB sticks as they are easy to lose and you don’t want anyone who finds your stick to be able to access your data. If you do need to regularly store data on a USB stick, ensure that it is secured with encryption. This way if you do lose it, the person who finds it is unable to access the data stored on the stick.

  1. Free BYOD from Malware

If your organization has a “Bring Your Own Device” policy, ensure that you have a way to monitor the configuration of those devices, and/or place them on a network screened from the managed network. “User managed” devices are more likely to be behind “organization managed” devices when it comes to the application of software updates and up-to-date anti-malware definitions and are thus more likely to be compromised by malware. If you want a service that can help you be protected from malware and to keep that prevention going for you and your devices, check out, they can help you identify your malware attack and defend what you need to so this does not happen again to you.

By implementing these simple measures, you can help protect not only your personal data, but that of your family, friends and colleagues. After all, like many fun things in life, technology should be enjoyed responsibly.

Join Orin Thomas at our Windows IT Pro co-hosted webinar, Next Level Document Security: Protect your Files from Prying Eyes with User-based Access, or request a recorded copy available at the end of June 2014 here.

Lock down security with Nitro Pro, now available with Microsoft RMS, for military-grade document protection by grabbing a free team trial.