The perils of Metadata in documents



Loose lips sink ships, so the old saying goes. These days documents are emailed back and forth and many times, revisions are made to “polite the text” up or “sanitize” or “redact sensitive information”. With many file formats though, the metadata about the revisions (or even the old versions of the data itself) are still there. The Security Fix has a great article on the topic today.


I remember a story several years ago about businesses being burned by revision changes that still existed in the Word document that was mailed out. (Application letters that had been changed for several employers/position availabilities with salary info/interoffice memos with poorly chosen comments about coworkers/bosses and even security breaches of sensitive information.)

What to do???? Brian gives some good links to Adobe’s site and information on finding metadata in pdf documents, Microsofts how-to find and remove meta-data for Microsoft Office documents, Harlan Carvey’s site on locating metadata in Windows and online (this link not currently working?) and a good freeware find…. Trace which is for finding documents with metadata online on an intranet, or on your pc. Like I said, this last one looks like a great piece of freeware.

It looks like the above are good reads for people that work with getting documents out to the public, or work in an organization that sends documents out to the world.

Related Posts

Blog Traffic Exchange Related Posts
  • How to Remove Personal Security | Personal Security Removal Guide Personal Security is a rogue antivirus application that comes from the same (dreaded) family as the Cyber Security rogue. It usually installs on the users computer without the permission of the computer user. Once installed on the system it will then perform supposed scans finding lots of virus infected files......
  • Phisher's getting sneakier The SecurityFix reports on this clever two-factor authentication phishing attempt. They were looking for Citibank Business customers and in addition to username password information they were looking to verify a supplied token. The bottom line is that phishers will look to find any way possible to social engineer you out......
  • Beware: Wolves in sheeps clothing found on different sites (security scams) This is another "wolf in sheeps clothing" alert. The Sunbelt blog has information and tips on a number of other sites that are posing as either the Windows security center page, or a page not found error. The windows security center spoof once again claims the following "Attention! Your system......
Blog Traffic Exchange Related Websites
  • Web Site Design And System: Staking The Island Inside An Sea Of Data If it were that easy then a internet is sure to have a great deal more websites up now than it already does. The strategy for one's website ought to be approached much being a chess game. Know how to position your pieces in a way to attain maximum benefit.......
  • Keep Those Spammers Out With .htaccess File Spammers possess a skill for creating overrides for you to even probably the most guaranteed aspect of the system such as these which are not readily acknowledged as potential locates. The .htaccess file can be used to preserve e-mail harvesters away. That is considered extremely successful since all of these......
  • Instant Web Designs Are Able To Do The Distinction Websites have the ability to reflect your small business strength inside of a very lucid way. Additionally assist you mark your online presence inside the online business environment that's really very crucial in today's growingly competitive online market space. Whether it be an informative site or perhaps a site that......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site