POST PRODUCTION TIPS: Protecting Your Assets


By Michael French

You’ve got your footage, a unique vision, and the right people and equipment in place to bring your project together. Well, you may have overlooked a critical component of post-production. No one wants your project compromised due to a lack of security and protection, so make sure to get the right security protocol in place as well.

Below is a list of 15 key measures you should take to protect your assets while in post.

1.  Designate one team member with the appropriate knowledge/capabilities to take responsibility for ensuring security of the project.

2.  Implement an effective process for secure asset management, transportation, tracking, storage, recall, destruction, and incident management.

3.  Document your security protocol and pass it to everyone engaged in the project, including remote locations and third parties. Foster discussion at the beginning of their involvement, so every collaborator can be aware of the security measures and confirm compliance.

4.  Ensure assets (scripts, budgets, camera cards, drives, etc.) are securely stored in protected areas with security camera coverage and limited access.

5.  Devices storing sensitive content (laptops, ipads, editing systems, etc.) should be protected by complex passwords, have remote tracking and disabling software enabled, and be stored securely in a locked office, cabinet, or by cables when not in use.

6.  Consumer grade file storage and collaboration technologies (DropBox, Google Drive, etc.) should be avoided in favor of a commercial-grade cloud system, or even better, a local server with ample storage. Your system for storing and sharing content should allow remote admin control for access rights.

7.  Deny the use of wireless on production networks.

8.  Editing systems should be configured to prohibit internet access.

9.  Content should always be encrypted when not in use.

10. Facility security systems should include cameras at key entrances and areas where sensitive content/documents are stored, alarm systems at all key entrances, and individual facility access codes for each production member.

11. Ensure authorization, secure configuration, and segregated use of hardware and software within your production network.

12. When shipping drives to third-parties or off-site locations, store them on encrypted and password protected shuttle drives in locked cases with non-descript packaging/labeling.

13. Consider disabling ports or using end-point security software to prevent unauthorized connection of non-approved devices and downloading of content to non-approved servers.

14. Ensure basic malware/vulnerability controls and application/software security updates are in place. Always scan drives for malware/viruses before connecting to your production network.

15. Audit your security system regularly, to ensure there are no holes that will leave your sensitive content vulnerable.


Popular posts from this blog

Best Production Company Logos and Title Cards