The following is an excerpt from Reviewing Your Data Protection Strategy, a free industry guide that looks at new data protection regulations in places like Europe, America, and Australia, and how to protect against the number one cause of data breaches.
Potential data breach: Hidden information in email attachments
Every document contains metadata. File metadata, for example, is embedded in the file and is different to the information that is typed on the page – such as Track Changes or comments. It can tell the reader who created the document, how long was spent editing it, and where the document is saved. Cleaning a document of metadata means that the recipient will only be sent what would be printed.
Solution: A document metadata cleaner add-in
Removing potentially harmful forms of metadata from attached files is the third risk area that should be considered when investigating ways to prevent email related data leaks. Technology to remove metadata has been available for some time and, like recipient and attachment checking, should also be deployed at the point of sending so that problems are addressed before emails leave the organization.
Download the Data Protection guide to learn more about the new regulations and simple solutions to make sure your workplace is protected.