Document Security in the Information Age: A Two-Pronged Approach

shutterstock_527443798 (1)Most people think of document security only in relation to highly sensitive documents. However, the security of information is not something that should be taken lightly. Documents are, after all, at the heart of everything that a business does. From product designs and development plans to invoices and contracts, documents are the lifeblood of communication and productivity in an organisation.

With the rise of digital information, BYOD initiatives, collaborative working practices, and more open, distributed corporate ecosystems, the need for document security has never been more acute. However, across many industries, document management and security practices fall short. A recent survey revealed that, though 74% of businesses have a formalised document management solution, only 49% of end users are aware of it.

We’ve written previously about why companies need a powerful document management system (DMS) to help organise and control complex development and business processes. But document management doesn’t end with harmonised file structures and collaboration - organisations must also ensure the integrity of sensitive information.

Security remains a concern. A 2016 Ponemon Institute study found that 76 percent of U.S. and European organisations had experienced data theft or loss in the previous two year period. And respondents say insider negligence is more than twice as likely to cause the compromise of insider accounts as any other culprits, including external attackers, malicious employees or contractors.

Only 29% of respondents say their companies fully enforce a strict least privilege model to ensure insiders have access to company data on a need to know basis only. That explains why 62% claim that they have access to data that they should not.

A two-pronged document security approach

If insider negligence is the biggest culprit in data loss and users have access to data they shouldn’t, that is a risky combination of circumstances. Couple that with how few end users are aware of and using their companies’ document management solutions, and it suggests we need a two-pronged approach to document security - one prong should address control and the other usability.

Document management and control

Document security is broader than firewalls and encryption. You should have a system that allows you to control the level of access that employees and other parties have. Ideally, the more “fine-grained” that control is the better you will be able to minimise the opportunity for those documents to fall into the wrong hands. With the right controls in place, employees that are allowed access to a particular document won’t be able to share it with someone who shouldn’t see it, accidentally or otherwise.

Additionally, the control you have should extend to use-rights - what permissions each user has to view or modify a document or set of documents.

Though we’ve identified internal negligence as the larger issue, external threats shouldn’t be ignored. To that end, encryption and other security measures are also important. Your DMS should offer secure user authentication and end-to-end 2048-bit SSL encryption. And, if it is cloud-based, you should scrutinise the security and backup/redundancy procedures of the data centre.

Also, with cloud-based accounts you should test the connection security of your online server to determine the protection your solution provides against 3rd parties extracting information by eavesdropping. You can test the security using 3rd party services such as SSL Labs. It should achieve a minimum of a grade A rating but ideally an A+.

DMS usability

The other way to help improve document security in an organisation is to make sure the document management system that’s put in place is used. This can be done by making sure it is as “usable” as possible. If a solution is easy to use, is intuitive and accessible, it will be adopted more willingly. If it’s confusing and opaque, users can get frustrated and may abandon it, reverting to their old ways of working.

Speaking of “old ways of working”, usability will be helped by implementing a DMS that is flexible. It should be able to adapt to your organisation’s existing operations and workflows without dictating changes to the way you work.

Without high usability, all the security and controls you put in place could be significantly less effective.

Maintaining the integrity and safety of your business documents is more important than ever. The “information age” has delivered incredible benefits to businesses in terms of productivity, collaboration and efficiency. But it has brought with it greater opportunities for data to be lost or compromised, either through negligence or maliciousness.

A document management system that offers both security and control as well as usability can help ensure you minimise the risk.

New call-to-action

Tags: Compliance

Joe Byrne

Written by Joe Byrne

Joe Byrne is the CEO of Cognidox. With a career spanning medical device start-ups and fortune 500 companies, Joe has over 25 years of experience in the medical device and high-tech product development industries. With extensive experience in scaling businesses, process improvement, quality, medical devices and product development, Joe is a regular contributor to the Cognidox DMS Insights blog where he shares expertise on scaling and streamlining the entire product development cycle, empowering enterprises to achieve governance, compliance, and rigour.

Related Posts

Why Not Use Q-Pulse as Your Med Tech eQMS?

Q-Pulse is a quality management system from Ideagen that helps organisations manage compliance, ...

What Is EU Annex 11 and How Does It Help Support GMP in Life Sciences?

EU Annex 11 provides guidelines for the use of computerised systems in ensuring Good Manufacturing ...

Navigating UKCA Marking for Medical Devices: What You Need to Know

Post-Brexit, there is still confusion about the future use of the UKCA (UK Conformity Assessed) ...