Page 237 - Cyber Defense eMagazine August 2024
P. 237

Watermarking and chain of custody

            For creatives  who work with visual media, especially—but  really for anyone who works with high-value
            data remotely—it’s  also a good idea to use both visible and invisible watermarking,  along with tracking
            all data movement through a recorded chain of custody.

            Visible watermarks  are useful in that they tell the world  a piece of content or file is yours. But a savvy
            user can also remove or crop them out fairly easily.

            That’s  why forensic  watermarking  exists.  Forensic  watermarking  embeds  an imperceptible,  metadata-
            infused  mark that gives content  owners  valuable  intel on who has viewed  their content.  This can help
            content owners track down the perpetrators in case of a data leak.

            Forensic  watermarks  are  imperceptible,  robust—they  should  never  break,  even  if  the  host  file  is
            dramatically altered—and are impossible to modify or alter.



            The Importance of Security for Remote Workflows


            Remote workers who deal with sensitive and valuable data and files need to take security as seriously
            as any corporate IT team.

            While the resources you have at your disposal aren’t quite the same as the head of IT for a Fortune 500
            company, there are several simple steps you can take to lock down your workflow, including:

               •  Securing remote connections and hardware.
               •  Using identity access management and the principle of least privilege.
               •  Encrypting all files both in flight and at rest.
               •  Document watermarking and chain of custody.

            By  following  these  best  practices  and  encouraging  a  culture  of  security  among  you  and  all  your
            stakeholders,  you can  ensure  your data  stays  secure—and  avoid getting  you,  your company,  or your
            partners placed on a data breach list.



            About the Author

            Majed Alhajry is the CTO of MASV, the fastest large file transfer solution for media
            organizations.  Majed’s  passion  lies  in  discovering  novel  solutions  for  complex
            technical problems, and he is an expert in the transfer of large files, both local and
            global,  as  well  as  in  networking  acceleration  technology  and  application  layer
            protocols.

            Majed  can  be  reached  online  at  https://www.linkedin.com/in/majed-alhajry-
            3a39a410/?originalSubdomain=ca  and at the company website: https://massive.io/






            Cyber Defense eMagazine – August 2024 Edition                                                                                                                                                                                                          237
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   232   233   234   235   236   237   238   239   240   241   242