From the course: Information Management: Document Security

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Continue your data security learning

Continue your data security learning

- [Phil] Okay, we've reached the end of this exploration into the foundations of document security. Since document security and file security is only part of your overall security program, we needed to spend time looking at that higher level. Your document security program is in part dictated by so many other things, including your network architecture, your cloud services, what your relationships are with external workers, and more. Where pertinent, I gave examples of how these factors all impact document security and made some suggestions about different ways to prepare for or mitigate challenges. I also shared some of the things that I feel will make a major impact on the success of your file security management and on security practices overall. The intent of this class was to stay at a high-level overview, but if you're looking for more information, there are resources available to you. I mentioned a few other…

Contents