DocuSign meets and exceeds the most stringent US, EU, and global security standards. No other Digital Transaction Management (DTM) company can match the enterprise security and operations investments DocuSign has made—and third-party audit reports back it up. DocuSign is the only eSignature provider to be xDTM, ISO 27001 and SSAE 16 certified and tested internationally, across the entire company and its data centers.
Aug. 26, 2015
DocuSign’s Single Sign-On certificate used for SAML AuthN requests and WS_Federation encryption in our NA1/NA2/EU1 production environments is about to expire. As a result, the certificate consumed by your Identity Provider (IdP) will be rolled over to ...
July 29, 2015
On July 20th, an out of band security update was released by Microsoft to address a critical vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits an untrusted ...
The number of worldwide email accounts is expected to increase from an installed base of 3.1 billion in 2011 to nearly 4.1 billion by year-end 2015, according to a report by Radicati. Unfortunately some people take advantage of that tremendous volume for malicious purposes. DocuSign relies on the secure DocuSign Global Network to ensure document security. But what about email, which falls outside our carefully maintained network? Here are a few best practices for maintaining the top levels of email security for yourself and your organization.
Maintain an anti-virus and anti-spyware programs and keep them up to date: It’s well worth the effort to keep programs designed to help protect your computer. Popular ones to guard against malicious code include McAfee, Symantec, and Trend Micro along with free versions such as Avira AntiVir, AVG, Avast, BitDefender and Comodo. For spyware concerns, look into Ad Aware SE, Malwarebytes, Spybot Search and Destroy and Windows Defender.
Unsure of a link or attachment? Don’t click it: If you’re not expecting a document to sign, contact the sender by phone or by starting a new email to him or her. You might also use your search engine to see if other people are discussing a scam related to the questionable email you received, before you take action. Don’t forward live links or click on unknown files as these are common methods cyber crooks use to get at your data.
Disable image previews. Use the setting that lets you decide whether to load images in each email, so you can decide first whether you trust the email and the sender.
Don’t always trust the apparent sender: The bad guys are smart enough to craft their malicious attempts to look, feel and sound like the major businesses that many people interact with regularly and already trust. Never provide sensitive or personal information in email, even if you think it is a legitimate communication. Email is not a secure way to transmit information. Instead, sign into your account on the company’s website and check on any requests there, or contact the company’s customer service department from their website (and not the email you received).
Don’t provide private or sensitive information to unknown parties: Social engineering is another common method to obtain data that holds value. This can be done in over the phone or in person by someone posing as an interested party intent in obtaining as much personal data as you will freely provide. Unless you can validate the person asking questions as authorized to receive the information, err on the side of caution and don’t provide with further validation.
Download patches and upgrades to your operating system: By scheduling automatic updates, you can update your browser (if you use Windows and Internet Explorer) which may fix security problems and help protect you from viruses and spyware.
At DocuSign, there is no greater priority than the security of our customers’ information, data and documents. To learn more about DocuSign security, please read more on this site. You may also read about why it’s safer to share documents on the DocuSign Global Network.
Security White Paper