Data privacy is an essential component to maintaining the health and security of your facility. Your data needs to be able to flow between the team members who need it in a secure system, contained and protected from leaking out critical resources–or letting in malicious invaders.
This Data Privacy Day, January 28th, we at DCM Inc. want to reiterate our commitment to ensuring your data is kept safe and secure in echo: our cutting-edge engineering drawing management software. When agreeing to provide data to a Software as a Service, it isn’t always clear how data privacy is being ensured. We want to keep you informed so that you know you are making the right, informed decision when you choose to trust your data with The Drawing Specialists.
Here are Four Ways echo Protects your Data Privacy
Encryption
Any application containing sensitive information requires encryption. As the leading drawing management company, we take encryption seriously! It may seem like a good idea for a company to develop their own secret algorithm or method of encoding data, but this is considered bad practice in the cryptography sphere. In echo, your data is protected by the well-established algorithm, which has been around since 2001–plenty of time to be picked apart by millions of eyes. It is a trusted, powerful method of encryption that has never been broken by attackers.
Salting
Beyond regular encryption, echo keeps your data protected with another cryptographic practice called salting. Salting basically adds random bits of data–a sprinkle of salt–to each password set up in the system. This means that even if two users happen to have identical passwords, the encrypted forms of those passwords will be entirely unique and not resemble the other at all.
Scaling Password Policy
Most software services nowadays require users to include various types of characters in their passwords. You know the drill: at least one capital letter, a number, and a special character like a dollar sign.Of course, this makes it tougher to guess than a password that’s just a word or phrase. We take this method a step further by scaling the password policy based on a user’s permissions in the system. The more permissions a user has, the stronger their password has to be.
Monitoring
echo is always being monitored for suspicious activity, and we take action to ensure anything out of the ordinary is locked out and reviewed in-real time. You can be assured that our technical teams have their eyes peeled for anything out of the ordinary that could potentially affect your data privacy.
Do you want to trust that your company’s data privacy is in safe, reliable hands?
Facility Managers around the globe are trusting echo, the leading drawing management company, with keeping their facilities’ data private and secure. Our security measures are tried and true. Our team would be happy to discuss echo and security further with you as we only sprinkled the surface with salt in the article. With DCM Inc. and echo on your side, you can be assured that your drawings are in safe hands. See more information on echo from DCM Inc.