5 January 2021
Many software review sites don’t mention security. That may be because security can be difficult to assess from the outside, unless you’re a hacker. However, we have noticed that some review sites do consider security and they do it in a way that may seem surprising at first: they simply ask, “does the company’s website talk about security?” Does that make sense? Let’s look at an example to find out.
Example of a document automation review website that assesses security
Documentautomationreviews.com is an example of a website that reviews document automation software and incorporates the security of the software into its grading system.
The reality is that the security of each document automation software package is opaque, and difficult to impossible for an outsider to assess, at least apart from engaging in a penetration test.
However, documentautomationreviews.com takes a simple tack: it simply checks whether the document automation software vendor discusses security on its website. If it does, the company is deemed to have a degree of security conscientiousness; if it doesn’t, the company is deemed to have potentially overlooked security issues.
Is this technique helpful?
While mentioning security on one’s website may be superficial, we agree that it does indicate whether the company’s staff are at least somewhat security conscious and thinking about security. It’s an imperfect metric, to be sure, but we think it’s better than nothing!
So the next time you’re considering buying document automation software, consider browsing their website and observing whether the website talks about security. It’s not a guarantee, but if they mention it they are more likely to take security concerns seriously than if they fail to mention it altogether.
When buying or subscribing to document automation software, you need to take security into account. But how can you know what to look for and what questions to ask potential vendors?
We think you should focus on two specific security risks: transit risk and storage risk.
Transit risk for document automation software
You should ask potential document automation software vendors if their “software client”, which will be installed on your PC, will communicate with their server. If so, you should ask if that communication is encrypted.
If the vendor mentions TLS (new name) or SSL (old name) encryption, then you’re probably in good shape. If they don’t mention any encryption, you should be concerned that your communication could be eavesdropped on via a man-in-the-middle attack.
Storage risk for document automation software
The other risk you need to pay attention to is storage risk. While your information may arrive safely on the document automation provider’s servers, if those servers are poorly protected a hacker might sneak in and grab your information.
So ask about the measures the document automation provider takes to secure documents when “at rest” or “in storage”. They should mention firewalls and possibly even encryption at rest.
However, there is one method of security that is even better than those: a document automation provider that deletes all uploaded content within a specified time range is the most secure of all. It’s impossible for a hacker to steal something that isn’t there.
This is the approach taken by some document automation software providers. Epsillion document automation is an example of a company that deletes customer-uploaded documents on a schedule the company agrees with each client.
In conclusion, consider both transit risk and storage risk when choosing a document automation software provider. Conscientious vendors take security precautions like encryption and regular deletion. It’s your right to ask potential vendors about their security precautions before you agree to become their customer. After all, the customer is always right!
20 April 2012
James Fallows had an article in the Atlantic last year that did a good job of scaring the wits out of me, as any entertaining and informative security article should. Fallows described what happened when his wife’s Gmail account was hacked and she (briefly, before friends of theirs at Google saved the day) lost the entire contents of her Gmail account. The experience got Fallows thinking about how vulnerable we are when we store our information in the cloud.
My passwords are strong — and I’m hoping yours are too after reading the articles on DtheK — but what if your account gets broken into anyway, either through a server problem, hacker, or some other issue? Most of us would be willing to expend considerable effort to prevent the loss of all of our email data in such a worst case scenario, so I’ve compiled a few ways you can protect yourself. Each method is rated by difficulty, using the “Grandma Frustration-O-Meter” gold standard.
Options for backing up your email accounts
- Use a desktop client like Microsoft Outlook, Zimbra, or Mozilla Firebird to download and store copies of your emails on your hard drive. Grandma-Frustration-O-Meter: What the dang is POP3? Aaack!
- If you want to backup a Gmail account, start a new Hotmail account. Then ask Hotmail to store copies of your emails. Or vice versa if you use Hotmail and want Gmail to store your emails. I haven’t looked into Yahoo, but I’m guessing something similar might work for that. Grandma-Frustration-O-Meter: Goes down easier than a warm glass of milk.
- Use Gmail Backup and hope that it is not stealing your password information like the program described here. User beware, but one reason to trust it is that it is featured on the Google Apps Marketplace; another reason is that Softpedia certifies it as a clean program, free of adware, spyware, and viruses. Grandma-Frustration-O-Meter: I have to remember to run the program monthly? Okey dokey. What? Where am I?
- Use Backupify, an online service that claims to be able to store all of your Gmail account information and settings, then restore it to a Gmail account at any time. Sounds great, but of course you have to trust Backupify with your email content. Even if you trust Backupify to keep your information private, you now have to worry about two websites that could potentially get hacked instead of just one. Grandma-Frustration-O-Meter: Remember the warm glass of milk? It’s like that, but pricier.
- Pray. Don’t worry about backups, use the password “Lucky123” for every account on the internet, and pray that trouble won’t befall you. Grandma-Frustration-O-Meter: Ignorance is bliss… while it lasts
While I am uneasy about giving my email password to anyone but Google, I have chosen options 1 and 2 (note that options 3 and 4 require trusting another program, company, or website with your password, too). Make your choice, and may the odds be ever in your favor.
23 June 2008
A few posts from the Defending the Kingdom archive, which summarize well the reasons I keep this blog.
- Why security is a problem that will, unfortunately, always be with us.
- Why we can’t expect technology to solve all of our security problems.
- How to think about security problems as a compromise between security and effort spent getting it.
3 May 2008
Where real kidnappings are common, criminals can stage fake kidnappings and get the same payoff:
The phone call begins with the cries of an anguished child calling for a parent: â€œMama! Papa!â€ The youngsterâ€™s sobs are quickly replaced by a husky male voice that means business.
â€œWeâ€™ve got your child,â€ he says in rapid-fire Spanish, usually adding an expletive for effect and then rattling off a list of demands that might include cash or jewels dropped off at a certain street corner or a sizable deposit made to a local bank.
The twist is that little Pablo or Teresa is safe and sound at school, not duct-taped to a chair in a rundown flophouse somewhere or stuffed in the back of a pirate taxi. But when the cellphone call comes in, that is not at all clear.
Authorities say hundreds of different criminal gangs are engaged in various telephone scams. Besides the false kidnappings, callers falsely tell people they have won cars or money. Sometimes, people are told to turn off their cellphones for an hour so the service can be repaired; then, relatives are called and told that the cellphoneâ€™s owner has been kidnapped. Ransom demands have even been made by text message.