top of page

FoxtIt Phantom allows users to create actions that will bulk process multiple PDF files, in a very similar fashion to how actions are created in Adobe Acrobat. It's quite easy to set up an action to password protect multiple PDF files. Follow these steps:


1. Go to File . . . Action Wizard . . . Create New Action

2. In the Protect menu, select Secure Document . . . Password Protect, and add this to the action.

3. From the File menu select Main Panel . . . Save and add that to the action.



ree

4. Under Password Protect click Specify Settings and enter a password. You'll also see an option to select a particular kind of encryption.


5. Be sure to uncheck the option to prompt user for both the Password Protect and Save steps in the action.

ree


6. After the action is saved, you can then run it by going back to File . . . Action Wizard . . . Run Action. You'll see a list of the actions that have been created.


7. After the action is run, a user will be prompted to enter a password each time a PDF is opened.

ree

 
 
  • Dec 1, 2020

A setting called 'client isolation' on a router will prevent a computer that connects to a wifi network from accessing computers (and other devices) that are on the same network with wired connections. This is very useful if you plan on having visitors use a network set-up for the use of attorneys from your firm.


The client isolation setting will also prevent two devices connected to the network via wifi from connecting with one another.


Client isolation (also known as wireless isolation) differs from guest wifi networks which involve an entirely separate access point. Client isolation uses firewalls to restrict visitors to connecting to the internet.

 
 

Using SMS text messages for two factor authentication is no longer considered a best practice.



Wired Magazine notes that a security expert believes, "two-factor authentication using SMS text messages isn't technically two-factor at all."


In January 2020, the Department of Computer Science and Center for Information Technology Policy at Princeton University published the results of a research project, An Empirical Study of Wireless Carrier Authentication for SIM Swaps, which concluded that, "users of websites relying on SMS-based MFA continue to be at risk—in some cases severely."


Cell phones can be vulnerable to phishing attacks that lead service providers to direct texts to different SIM cards. The New York State Department of Consumer Protection has posted a warning about scams which aim to switch SIM cards to new devices. The Princeton Study, "identified weak authentication schemes and flawed policies at 5 US mobile carriers from the prepaid market. We showed that these flaws enable straightforward SIM swap attacks."


International mobile subscriber identity-catcher (IMSI) are mobile towers set up for malicious reasons to intercept text messages.


Malware can also be installed on smartphones which will intercept codes used for 2FA.


Using a token or an authentication app that generates temporary codes are better alternatives. Google Authenticator will generate temporary 8 digit passwords.









 
 

Sean O'Shea has more than 20 years of experience in the litigation support field with major law firms in New York and San Francisco.   He is an ACEDS Certified eDiscovery Specialist and a Relativity Certified Administrator.

The views expressed in this blog are those of the owner and do not reflect the views or opinions of the owner’s employer.

If you have a question or comment about this blog, please make a submission using the form to the right. 

Your details were sent successfully!

© 2015 by Sean O'Shea . Proudly created with Wix.com

bottom of page