{"id":9332,"date":"2024-09-23T19:49:49","date_gmt":"2024-09-23T19:49:49","guid":{"rendered":"https:\/\/painlesspymes.com\/seven-tips-to-keep-your-companys-documents-safe\/"},"modified":"2024-09-23T19:49:49","modified_gmt":"2024-09-23T19:49:49","slug":"seven-tips-to-keep-your-companys-documents-safe","status":"publish","type":"post","link":"https:\/\/painlesspymes.com\/en\/seven-tips-to-keep-your-companys-documents-safe\/","title":{"rendered":"Seven tips to keep your company&#8217;s documents safe"},"content":{"rendered":"<div class=\"nLG8d5\" data-hook=\"post-description\">\n<article class=\"blog-post-page-font\">\n<div class=\"post-content__body\">\n<div class=\"NjQ71C\">\n<div class=\"NjQ71C\">\n<div class=\"ZylKKv md1nXG SwMATA\" data-rce-version=\"9.3.6\">\n<div class=\"kvdbP HWlYoF wrLZsV _1O7aH\" dir=\"ltr\" data-id=\"rich-content-viewer\">\n<div class=\"_1hN1O uyQefQ _3EPBy\">\n<p id=\"viewer-foo\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _78FBa sk96G9 roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">We lose important information for many reasons, often due to issues that we do not consider in our electronic documentation management processes. I&#8217;m sharing some points that I think we should consider: <\/span><\/p>\n<p id=\"viewer-a3106\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>1. Build a work process and support it through an electronic documentation management policy.<\/strong> Most information losses can generally be prevented. These sometimes start with a failure in the data management process or the lack thereof.<\/span><\/p>\n<p id=\"viewer-9n277\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _78FBa sk96G9 roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">I once spoke with a very successful manager of a company, and he told me: <em>\u201cDocuments do not belong to the end user. The information is of and for the company, therefore the end user must follow the guidelines we create or face the consequences of not following them.\u201d<\/em><\/span><\/p>\n<p id=\"viewer-5up28\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _78FBa sk96G9 roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">It sounds dictatorial to some extent; however, this gentleman managed to create a culture of responsibility in relation to the management of his organization&#8217;s documents, managing to convey the value of these to his employees.<\/span><\/p>\n<p id=\"viewer-d82jk\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _78FBa sk96G9 roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">Basically, the creation, presentation, and correct understanding of the process by employees, added to a clear document management policy in the organization, establish the basis of security at the documentation level.<\/span><\/p>\n<p id=\"viewer-bm8tb\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _78FBa sk96G9 roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>2. Use an antivirus<\/strong> When they contact us to recover documents, a common factor apart from the lack of information backups is the lack of an antivirus on the end user&#8217;s computer. This includes Apple computers (MacOS system). <strong>Yes, ladies and gentlemen, these computers are not \u201cimmune\u201d to the viruses that circulate on the Internet.<\/strong> As for which antivirus to use, there are many good products on the market. One of my favorites is <a class=\"_3Bkfb _1lsz7\" href=\"https:\/\/latam.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-hook=\"linkViewer\"><u class=\"_3zM-5\">Kaspersky<\/u><\/a>, as it provides protection on its <a class=\"_3Bkfb _1lsz7\" href=\"https:\/\/latam.kaspersky.com\/small-to-medium-business-security\" target=\"_blank\" rel=\"noopener noreferrer\" data-hook=\"linkViewer\"><u class=\"_3zM-5\">EndPoint<\/u><\/a> platform at a centralized level, allowing the creation of protection policies at the business level. It also provides us with alternatives such as <a class=\"_3Bkfb _1lsz7\" href=\"https:\/\/latam.kaspersky.com\/small-to-medium-business-security\/microsoft-office-365-security\" target=\"_blank\" rel=\"noopener noreferrer\" data-hook=\"linkViewer\"><u class=\"_3zM-5\">Kaspersky Security for Microsoft Office 365<\/u><\/a>, which allows us to connect with Microsoft Office 365, so that protection starts with the documents before they reach the user and even in their Cloud system.<\/span><\/p>\n<p id=\"viewer-51kos\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>3. Use an application to synchronize your employees&#8217; files in the cloud<\/strong><\/span><\/p>\n<p id=\"viewer-c02ir\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _78FBa sk96G9 roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">We have plenty of alternatives: <em>OneDrive, Google Drive, Dropbox,<\/em> among others. I personally use OneDrive for my business documents, both those I manage on a daily basis and those shared with employees. The important thing at this point is to always save the information in the folder assigned for this application, so that the system will synchronize the data and we will be sure to have a backup in real time. <\/span><\/p>\n<p id=\"viewer-6jgbj\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>4. Centralize your company&#8217;s information in a secure location<\/strong><\/span><\/p>\n<p id=\"viewer-b66kb\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _78FBa sk96G9 roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">Centralizing documentation in a secure site for sharing documents is key to the correct application of documentation management processes, policy compliance, and audits.<\/span><\/p>\n<p id=\"viewer-3elor\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">By centralizing information and creating folders by department, we ensure that employees will work more fluidly with their team members and at the same time we begin to create a culture of documentation management in the organization.<\/span><\/p>\n<p id=\"viewer-4a87r\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">The users themselves will request that the data be saved on the shared site so that they can work or follow up on requests, presentations, proposals, financial statements, among other documents.<\/span><\/p>\n<p id=\"viewer-fq75e\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>5. Assign access permissions to documents<\/strong><\/span><\/p>\n<p id=\"viewer-8fvum\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _78FBa sk96G9 roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">This is a bit more technical, but it will be easy for your technology provider to understand. All you need to provide is a directory of documents that you want in your business and indicate which users or departments can access them.<\/span><\/p>\n<p id=\"viewer-8apl4\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">As easy as the following example:<\/span><\/p>\n<p id=\"viewer-8mt00\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>Who has access? <\/strong>Finance team or \u201cJuanito X\u201d<\/span><\/p>\n<p id=\"viewer-6s9do\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>Define the type of permission.<\/strong> Read, Write, View, or Full Control<\/span><\/p>\n<p id=\"viewer-4snk3\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>What directory structure do you want?<\/strong><\/span><\/p>\n<p id=\"viewer-979ig\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">&#8211; Finances<\/span><\/p>\n<p id=\"viewer-5ba0o\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">&#8211; Reports<\/span><\/p>\n<p id=\"viewer-492hf\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">&#8211; Financial Statements<\/span><\/p>\n<p id=\"viewer-f5lig\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">For this type of structure, I use <a class=\"_3Bkfb _1lsz7\" href=\"https:\/\/www.microsoft.com\/es-ww\/microsoft-365\/sharepoint\/collaboration\" target=\"_blank\" rel=\"noopener noreferrer\" data-hook=\"linkViewer\"><u class=\"_3zM-5\">Microsoft SharePoint<\/u><\/a>, as it integrates very easily with Windows and even with MacOS.<\/span><\/p>\n<p id=\"viewer-5rloc\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _78FBa sk96G9 roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>A little <em>tip:<\/em> Do not use long names for the files. There are people who want to describe the entire content of the file in the title of the file. Be brief when naming a document. Believe me, because of a long name I have seen users have difficulties recovering those documents from their backup system. <\/strong><\/span><\/p>\n<p id=\"viewer-fgiv2\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>6. Configure audits<\/strong><\/span><\/p>\n<p id=\"viewer-cvfd9\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">Request that your provider configure rules and audits to control the management of documentation.<\/span><\/p>\n<p id=\"viewer-3i6e3\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">Example:<\/span><\/p>\n<p id=\"viewer-b3f6t\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _78FBa sk96G9 roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">The finance team can send emails outside the organization, but I want it to be recorded every time they send a financial report to an email outside our organization.<\/span><\/p>\n<p id=\"viewer-77jt6\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>7. Use passwords (almost obvious) and two-factor authentication<\/strong><\/span><\/p>\n<p id=\"viewer-5o8g5\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _78FBa sk96G9 roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">In relation to passwords, you can&#8217;t imagine how many people configure their passwords with information about their pets, family members, or date of birth, or as easy as deducing that it is <strong>the password they use for everything.<\/strong><\/span><\/p>\n<p id=\"viewer-fc855\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _78FBa sk96G9 roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">I recommend <a class=\"_3Bkfb _1lsz7\" href=\"https:\/\/www.microsoft.com\/es-ww\/security\/business\/identity\/mfa\" target=\"_blank\" rel=\"noopener noreferrer\" data-hook=\"linkViewer\"><strong><u class=\"_3zM-5\">two-factor authentication<\/u><\/strong><\/a>. Most systems ask you for this configuration and on many occasions we \u201cclick\u201d on the \u201cremember me later\u201d or \u201cskip\u201d option.<\/span><\/p>\n<p id=\"viewer-3tlg0\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _78FBa sk96G9 roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\">It is important that we take some time to configure this alternative that will help us avoid many losses of information, thefts, scams, or other problems. This will help us know when someone unauthorized is trying to use our applications or access our information.<\/span><\/p>\n<p id=\"viewer-7pckd\" class=\"mm8Nw _1j-51 roLFQS _1FoOD _3M0Fe Z63qyL roLFQS public-DraftStyleDefault-block-depth0 fixed-tab-size public-DraftStyleDefault-text-ltr\"><span class=\"_2PHJq public-DraftStyleDefault-ltr\"><strong>I hope these 7 tips are very useful to you. If you want to know more about it, you can request more information from this <\/strong><a class=\"_3Bkfb _1lsz7\" href=\"https:\/\/wa.me\/+50660059214\" target=\"_blank\" rel=\"noopener noreferrer\" data-hook=\"linkViewer\"><strong><u class=\"_3zM-5\">WhatsApp<\/u><\/strong><\/a><\/span><\/p>\n<div data-hook=\"rcv-block54\"><\/div>\n<div data-hook=\"rcv-block-last\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<div id=\"post-footer\" class=\"OFA52E jG7PL8\">\n<div class=\"ux83lW\" data-hook=\"post-main-actions-desktop\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>We lose important information for many reasons, often due to issues that we do not consider in our electronic documentation management processes. I&#8217;m sharing some points that I think we should consider: 1. Build a work process and support it through an electronic documentation management policy. Most information losses can generally be prevented. These sometimes [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9333,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"footnotes":""},"categories":[41],"tags":[],"class_list":["post-9332","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/painlesspymes.com\/en\/wp-json\/wp\/v2\/posts\/9332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/painlesspymes.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/painlesspymes.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/painlesspymes.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/painlesspymes.com\/en\/wp-json\/wp\/v2\/comments?post=9332"}],"version-history":[{"count":0,"href":"https:\/\/painlesspymes.com\/en\/wp-json\/wp\/v2\/posts\/9332\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/painlesspymes.com\/en\/wp-json\/wp\/v2\/media\/9333"}],"wp:attachment":[{"href":"https:\/\/painlesspymes.com\/en\/wp-json\/wp\/v2\/media?parent=9332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/painlesspymes.com\/en\/wp-json\/wp\/v2\/categories?post=9332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/painlesspymes.com\/en\/wp-json\/wp\/v2\/tags?post=9332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}