{"id":119103,"date":"2022-12-02T11:42:26","date_gmt":"2022-12-02T11:42:26","guid":{"rendered":"https:\/\/massive.io\/?p=119103"},"modified":"2026-04-06T10:17:21","modified_gmt":"2026-04-06T14:17:21","slug":"film-tv-production-security","status":"publish","type":"post","link":"https:\/\/massive.io\/es\/seguridad-y-conformidad\/seguridad-produccion-cine-y-television\/","title":{"rendered":"C\u00f3mo proteger tu productora de cine y televisi\u00f3n. Consejos de seguridad."},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|8%|0px|8%|false|true&#8221; custom_padding_tablet=&#8221;0px|4%|0px|4%|false|true&#8221; custom_padding_phone=&#8221;0px|4%|0px|4%|false|true&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;7b1bf5ad-cc2a-4448-981c-4963d88bd6e8&#8243; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;0px|8%|0px|8%|false|true&#8221; custom_padding_tablet=&#8221;0px|0px||0px|false|true&#8221; custom_padding_phone=&#8221;25px|0px|0px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>It\u2019s no secret that cyberattacks have escalated in frequency and severity across a broad spectrum of industries. IBM\u2019s much-referenced <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\">Cost of a Data Breach<\/a> report for 2022 indicates that more than 80 percent of all companies will at some point suffer a <a href=\"https:\/\/massive.io\/content-security\/data-theft-hackers-steal-files-remotely\/\">data breach<\/a>.<\/p>\n<p>The average cost of a data breach for a U.S. company, according to that same report?<strong> $9.44 million<\/strong>.<\/p>\n<p>And the media industry is no exception. First, there was the Sony Pictures hack in 2014. Then Netflix and HBO got hit in 2017. Cox Media Group, which works with major U.S. broadcasters such as NBC and CBS, and video game developer CD Projekt Red suffered ransomware attacks last year.<\/p>\n<p>Any organization hosting prerelease and other valuable content is a potential target for data breaches, data exfiltration, ransomware, and other cyberattacks. And the cost to a production company\u2019s reputation in the event of a breach can be devastating.<\/p>\n<p>With that, here are some tips and <strong>film &amp; tv production security guidelines<\/strong> to consider for your next production.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;2514b1ee-af07-4bc3-a96b-c9aaa32f4a18&#8243; text_font_size=&#8221;24px&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;|-54px|0px||false|false&#8221; custom_padding=&#8221;0px|||0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"\" data-block=\"true\" data-editor=\"520fd\" data-offset-key=\"ekesf-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"ekesf-0-0\">\n<p><strong>Table of Contents<\/strong><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;2514b1ee-af07-4bc3-a96b-c9aaa32f4a18&#8243; text_font_size=&#8221;18px&#8221; width=&#8221;100%&#8221; width_tablet=&#8221;100%&#8221; width_phone=&#8221;100%&#8221; width_last_edited=&#8221;on|tablet&#8221; max_width=&#8221;100%&#8221; custom_margin=&#8221;|-54px|0px||false|false&#8221; custom_padding=&#8221;0px|||0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"\" data-block=\"true\" data-editor=\"520fd\" data-offset-key=\"ekesf-0-0\">\n<div class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"ekesf-0-0\">\n<ul>\n<li><a href=\"#physical\">Physical Production Security<\/a><\/li>\n<li><a href=\"#asset\">Asset Management Production Security (Who Has Access to What and When)<\/a><\/li>\n<li><a href=\"#virtual\">Virtual Data Production Security (File Transfer, Encryption, Cloud Storage, etc.)<\/a><\/li>\n<li><a href=\"#stages\">Security Considerations for Different Stages of Production (Pre, Principal, and Post)<\/a><\/li>\n<li><a href=\"#wrong\">What to Do if Something Goes Wrong?<\/a><\/li>\n<li><a href=\"#masv\">How MASV Helps Secure Film Production<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_cta title=&#8221;Secure Large File Transfer&#8221; button_url=&#8221;https:\/\/app.massive.io\/en\/signup&#8221; button_text=&#8221;Sign-Up for MASV&#8221; module_class=&#8221;starttrial&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_font=&#8221;||||||||&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.3em&#8221; background_color=&#8221;#202332&#8243; background_color_gradient_start=&#8221;#3d72e7&#8243; background_color_gradient_end=&#8221;#202332&#8243; background_color_gradient_direction=&#8221;206deg&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_use_color_gradient=&#8221;on&#8221; button_bg_color_gradient_start=&#8221;#3d72e7&#8243; button_bg_color_gradient_end=&#8221;#53a0fe&#8221; button_bg_color_gradient_direction=&#8221;293deg&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;50px&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;10px|42px|10px|42px|true|true&#8221; custom_margin=&#8221;||20px||false|false&#8221; link_option_url=&#8221;https:\/\/app.massive.io\/en\/signup&#8221; border_width_top=&#8221;10px&#8221; border_color_top=&#8221;#3d72e7&#8243; border_color_left=&#8221;#3d72e7&#8243; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;-13px&#8221; box_shadow_style_button=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221; button_border_width__hover_enabled=&#8221;on|hover&#8221; button_custom_padding__hover_enabled=&#8221;on|hover&#8221; button_custom_padding__hover=&#8221;|2em|||false|false&#8221; button_border_width__hover=&#8221;0px&#8221;]<\/p>\n<p>Encrypted large file transfer with IS0 27001 certification; get started with MASV.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;7b1bf5ad-cc2a-4448-981c-4963d88bd6e8&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;1.5em|8%|0px|8%|false|true&#8221; custom_padding_tablet=&#8221;0px|0px|4%|0px|false|true&#8221; custom_padding_phone=&#8221;0px|0px|7%|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/massive.io\/wp-content\/uploads\/2022\/11\/secure-film-production_physical-security.jpg&#8221; alt=&#8221;A security professional reviews CCTV footage&#8221; title_text=&#8221;secure film production_physical security&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text module_id=&#8221;physical&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;2514b1ee-af07-4bc3-a96b-c9aaa32f4a18&#8243; header_3_font_size=&#8221;26px&#8221; custom_margin=&#8221;||0%||false|false&#8221; custom_margin_tablet=&#8221;||12px||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||||false|false&#8221; custom_padding_tablet=&#8221;||0px||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 data-pm-slice=\"1 1 []\">Physical Production Security<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Film production security should include physical security elements<\/strong> common in other facilities housing valuable intellectual property (IP). These typically include a secure facility requiring key fobs or badges for access, CCTV cameras, and strict rules about bringing external hardware or mobile devices inside.<\/p>\n<p>According to the <a href=\"https:\/\/www.mesaonline.org\/wp-content\/uploads\/2016\/04\/CDSA-Recommended-Best-Practices-for-Production-and-Post-Production-Editorial-v16.2.pdf\" target=\"_blank\" rel=\"noopener\">CDSA<\/a>, specific elements of physical production security include:<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>1. Secure perimeters<\/h3>\n<p>Your secure perimeter should have multiple layers of protection, including closed-circuit television (CCTV) cameras, automated access control and key fobs\/badges, and well-defined visitor procedures.<\/p>\n<p>Security guards may make sense depending on the level of risk, but they must meet security requirements for third parties. A perimeter intrusion detection system (PIDS) can detect perimeter breaches.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>2. Well-defined roles and responsibilities<\/h3>\n<p>While all employees should understand security procedures relevant to their jobs through security awareness training, production facilities should appoint a trusted team with relevant skills and knowledge for overall content security.<\/p>\n<p>Each department should also have one person responsible for security policy and procedures. Document their (and others\u2019) roles and responsibilities.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>3. Trust, but verify (your employees and contractors)<\/h3>\n<p>Run background checks on all employees and third-party contractors, including proof of identity, employment and personal references, and professional qualifications checks.<\/p>\n<p>Third-party companies should provide contractual guarantees around their level of security training and policies. Be sure to highlight security requirements in employee and third-party contracts.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>4. Secure internal areas<\/h3>\n<p>All internal zones with access to the production environment and IP storage must be further physically protected by monitoring and restricting access. All assets within the production office, such as scripts, drives, and camera cards, must be securely stored and ideally monitored via CCTV.<\/p>\n<p>Keep detailed access logs around who accessed which media and when.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>5. Secure devices<\/h3>\n<p>All personal and mobile devices (from mobile phones to laptops) must be protected with strong passwords and remote tracking software and locked in a vault, safe, or filing cabinet.<\/p>\n<p>[\/et_pb_text][et_pb_cta title=&#8221;Protect Your Data Transfers&#8221; button_url=&#8221;https:\/\/app.massive.io\/en\/signup&#8221; button_text=&#8221;Sign-Up for MASV&#8221; module_class=&#8221;starttrial&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_font=&#8221;||||||||&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.3em&#8221; background_color=&#8221;#202332&#8243; background_color_gradient_start=&#8221;#3d72e7&#8243; background_color_gradient_end=&#8221;#202332&#8243; background_color_gradient_direction=&#8221;206deg&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_use_color_gradient=&#8221;on&#8221; button_bg_color_gradient_start=&#8221;#3d72e7&#8243; button_bg_color_gradient_end=&#8221;#53a0fe&#8221; button_bg_color_gradient_direction=&#8221;293deg&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;50px&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;10px|42px|10px|42px|true|true&#8221; custom_margin=&#8221;||20px||false|false&#8221; link_option_url=&#8221;https:\/\/app.massive.io\/en\/signup&#8221; border_width_top=&#8221;10px&#8221; border_color_top=&#8221;#3d72e7&#8243; border_color_left=&#8221;#3d72e7&#8243; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;-13px&#8221; box_shadow_style_button=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221; button_border_width__hover_enabled=&#8221;on|hover&#8221; button_custom_padding__hover_enabled=&#8221;on|hover&#8221; button_custom_padding__hover=&#8221;|2em|||false|false&#8221; button_border_width__hover=&#8221;0px&#8221;]<\/p>\n<p>Set a custom password, download limits, enable MFA, or set a file expiry date with MASV.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;7b1bf5ad-cc2a-4448-981c-4963d88bd6e8&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;1.5em|8%|0px|8%|false|true&#8221; custom_padding_tablet=&#8221;0px|0px|4%|0px|false|true&#8221; custom_padding_phone=&#8221;0px|0px|7%|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/massive.io\/wp-content\/uploads\/2022\/11\/secure-film-production_asset-security.jpg&#8221; alt=&#8221;A video editor reviews a storyboard in front of her computer&#8221; title_text=&#8221;secure film production_asset security&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text module_id=&#8221;asset&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;2514b1ee-af07-4bc3-a96b-c9aaa32f4a18&#8243; header_3_font_size=&#8221;26px&#8221; custom_margin=&#8221;||0%||false|false&#8221; custom_margin_tablet=&#8221;||12px||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||||false|false&#8221; custom_padding_tablet=&#8221;||0px||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 data-pm-slice=\"1 1 []\">Asset Management Production Security (Who Has Access to What and When)<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The Content Delivery &amp; Security Association (<a href=\"https:\/\/www.mesaonline.org\/wp-content\/uploads\/2019\/02\/CDSA-Production-Security-Guidelines-01-19-v1.pdf\" target=\"_blank\" rel=\"noopener\">CDSA<\/a>) lists asset-related film and TV production security guidelines to build upon the above for film production security. These include:<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>1. Asset management systems<\/h3>\n<p>Production facilities must implement a transparent asset management process that includes an auditable content chain of custody, along with a register for documenting media creation\/registration, location, movements, and destruction.<\/p>\n<p>All content destruction and recycling of assets must be documented, including a certificate of destruction if done by a third party, and should follow National Institute of Standards and Technology (NIST) media sanitization standards (SP 800-88) best practices.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>2. Non-disclosure agreements (NDAs)<\/h3>\n<p>All production staff and contractors should sign NDAs and additional agreements (if necessary) not to share internal and confidential information with others. NDAs should spell out the consequences for the unauthorized sharing of confidential information.<\/p>\n<p>NDAs can be presented to potential staff and contractors during their background checks and can be incorporated directly into employment agreements.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>3. Access to media<\/h3>\n<p>All access to safes, vaults, cabinets, and other storage areas containing sensitive information (including <a href=\"https:\/\/massive.io\/file-transfer\/cloud-vs-on-premises-file-sharing\/\" class=\"notion-link-token notion-enable-hover\" target=\"_blank\" rel=\"noopener noreferrer\" data-token-index=\"1\" data-reactroot=\"\"><span class=\"link-annotation-unknown-block-id-587052762\">on-prem servers<\/span><\/a> or cloud storage) or equipment must be limited to approved personnel only. Authorized personnel should have individual access codes.<\/p>\n<p>Codes should be changed as people cycle through the project or organization.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3>4. Shipping media<\/h3>\n<p>Shipping media on a hard drive can be risky; it\u2019s advised content owners <a href=\"https:\/\/massive.io\/solutions\/send-large-files\/\" class=\"notion-link-token notion-enable-hover\" target=\"_blank\" rel=\"noopener noreferrer\" data-token-index=\"1\" data-reactroot=\"\"><span class=\"link-annotation-unknown-block-id--347818625\">send large files<\/span><\/a> using <a href=\"https:\/\/massive.io\/product\/secure-file-transfer\/\" class=\"notion-link-token notion-enable-hover\" target=\"_blank\" rel=\"noopener noreferrer\" data-token-index=\"3\" data-reactroot=\"\"><span class=\"link-annotation-unknown-block-id--794445927\">secure, cloud-based large file transfer solutions<\/span><\/a>. But if media is <a href=\"https:\/\/massive.io\/how-to\/how-to-ship-hard-drives\/\" class=\"notion-link-token notion-enable-hover\" target=\"_blank\" rel=\"noopener noreferrer\" data-token-index=\"5\" data-reactroot=\"\"><span class=\"link-annotation-unknown-block-id-1550482887\">physically shipped<\/span><\/a>, store all dailies content on encrypted and password-protected drives within locked cases and tamper-resistant packaging.<\/p>\n<p>Don&#8217;t list project information or titles on the label, and couriers must not be able to access the media.<\/p>\n<p>Couriers should have appropriate insurance and well-defined and monitored pick-up and drop-off locations.<\/p>\n<p>[\/et_pb_text][et_pb_cta title=&#8221;Keep a Record of Your File Transfers&#8221; button_url=&#8221;https:\/\/app.massive.io\/en\/signup&#8221; button_text=&#8221;Sign-Up for MASV&#8221; module_class=&#8221;starttrial&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_font=&#8221;||||||||&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.3em&#8221; background_color=&#8221;#202332&#8243; background_color_gradient_start=&#8221;#3d72e7&#8243; background_color_gradient_end=&#8221;#202332&#8243; background_color_gradient_direction=&#8221;206deg&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_use_color_gradient=&#8221;on&#8221; button_bg_color_gradient_start=&#8221;#3d72e7&#8243; button_bg_color_gradient_end=&#8221;#53a0fe&#8221; button_bg_color_gradient_direction=&#8221;293deg&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;50px&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;10px|42px|10px|42px|true|true&#8221; custom_margin=&#8221;||20px||false|false&#8221; link_option_url=&#8221;https:\/\/app.massive.io\/en\/signup&#8221; border_width_top=&#8221;10px&#8221; border_color_top=&#8221;#3d72e7&#8243; border_color_left=&#8221;#3d72e7&#8243; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;-13px&#8221; box_shadow_style_button=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221; button_border_width__hover_enabled=&#8221;on|hover&#8221; button_custom_padding__hover_enabled=&#8221;on|hover&#8221; button_custom_padding__hover=&#8221;|2em|||false|false&#8221; button_border_width__hover=&#8221;0px&#8221;]<\/p>\n<p>MASV notifies you when someone downloads your transfer and keeps a detailed log of every transaction.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;7b1bf5ad-cc2a-4448-981c-4963d88bd6e8&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;1.5em|8%|0px|8%|false|true&#8221; custom_padding_tablet=&#8221;0px|0px|4%|0px|false|true&#8221; custom_padding_phone=&#8221;0px|0px|7%|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/massive.io\/wp-content\/uploads\/2022\/11\/secure-film-production_virtual-security.jpg&#8221; alt=&#8221;A remote video editor reviews footage on his computer&#8221; title_text=&#8221;secure film production_virtual security&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text module_id=&#8221;virtual&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;2514b1ee-af07-4bc3-a96b-c9aaa32f4a18&#8243; header_3_font_size=&#8221;26px&#8221; custom_margin=&#8221;||0%||false|false&#8221; custom_margin_tablet=&#8221;||12px||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||||false|false&#8221; custom_padding_tablet=&#8221;||0px||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 data-pm-slice=\"1 1 []\">Virtual Data Production Security (File Transfer, Encryption, Cloud Storage, etc.)<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>While these physical security measures are vital, the reality of cloud-based media workflows means <strong>remote security is now just as important as the physical security<\/strong> of your facility.<\/p>\n<p>But maintaining the same air-tightness achieved by secure facilities \u2014 especially when working with remote employees, partners, or clients spread all over the world and using various applications and Wi-Fi networks \u2014 can be difficult.<\/p>\n<p>New approaches, many already in development before the film industry\u2019s remote work revolution, are now required to secure production workflows.<\/p>\n<p><a href=\"https:\/\/movielabs.com\/prodtech\/security\/Evolution-of-Production-Security-Final.pdf\" target=\"_blank\" rel=\"noopener\">MovieLabs<\/a>, a not-for-profit founded by major studios such as Disney, Paramount, and Warner Bros., identified six overarching security principles for modern video production within its \u201c2030 Vision\u201d initiative, including the concept of security by design.<\/p>\n<p>Concrete steps organizations can take to fulfill these and other security best practices include:<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>1. Secure remote endpoints and connection points<\/h3>\n<p>It\u2019s important to lock down any remote access points to your system \u2014 even those you may not be aware of (yet). As film editor <a href=\"https:\/\/www.avid.com\/resource-center\/addressing-post-production-security-concerns-in-remote-workflows\" target=\"_blank\" rel=\"noopener\">Jonny Elwyn<\/a> says,<\/p>\n<blockquote>\n<p>\u201cThere\u2019s no point triple-locking all your doors if you leave the window open.\u201d<\/p>\n<\/blockquote>\n<p>This means ensuring the security of each partner or collaborator\u2019s Wi-Fi network and using secure applications with encryption, such as Teradici\u2019s PC over IP (PCoIP) technology for secure <a href=\"https:\/\/massive.io\/gear-guides\/remote-desktop-software-for-video-editing\/\">virtual desktops<\/a>. Organizations can also use virtual private networks (VPNs) to establish a secure connection, although it\u2019s worth noting that VPNs have several well-documented <a href=\"https:\/\/www.zdnet.com\/article\/many-organisations-dont-know-how-to-manage-vpn-security-properly-and-cyber-criminals-are-taking-advantage\/\" target=\"_blank\" rel=\"noopener\">security flaws<\/a>.<\/p>\n<p>Securing your remote connections also means ensuring employees and collaborators are always sensitive to what they share on remote collaboration applications such as <a href=\"https:\/\/massive.io\/integrations\/slack\/\">Slack<\/a> or Google Meet.<\/p>\n<p>Any files transferred using IP-based methods should use a secure file sharing solution.<\/p>\n<p>Remote hardware, as well, must be secured \u2014 especially in the age of bring-your-own-device (BYOD) and the proliferation of personal devices used for remote work. You can mitigate this risk through security training and by ensuring your collaborators have up-to-date endpoint protection software, or by using secure virtual desktop infrastructure.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>2. Implement a Zero Trust security framework<\/h3>\n<p>Zero trust security frameworks eschews traditional perimeter-based IT security models, which by default trust every user once they\u2019ve made it inside the perimeter. This approach gives users access to only the resources, applications, or data they need \u2013 and nothing more.<\/p>\n<p>That means that even if they penetrate a system\u2019s first line of defence, attackers don\u2019t have the freedom to roam around and are constantly challenged \u2014 even when inside your system \u2014 if they try to access additional resources.<\/p>\n<p>Zero trust architectures typically include automated network monitoring for real-time security alerts. They also feature multi-factor authentication (MFA) and other identification and access management controls, such as device authentication and constant verification of all access subjects (whether it\u2019s a person, device, or application).<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>3. Watermark, encrypt, and track your media<\/h3>\n<p>Visible and invisible watermarking of each piece of media isn\u2019t a new security concept by any means, but it\u2019s still valuable.<\/p>\n<p>Watermarking or file fingerprinting can be invaluable if someone steals or leaks your media or you need to conduct a forensic analysis.<\/p>\n<p>You should also track the movement of each piece of media through your and others\u2019 systems through chain-of-custody software, which tracks the location of an item, every other location it has resided since creation\/collection, and any changes made to it along the way.<\/p>\n<p>Without a strong chain of custody, it\u2019s much more difficult to figure out what happened should your assets be misplaced or accessed by unauthorized individuals.<\/p>\n<p>Finally, ensure you <strong>encrypt your media both in-flight and at-rest<\/strong>, preferably with strong encryption such as Advanced Encryption Standard (AES) 256 or Transport Layer Security (TLS).<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>4. Conduct regular, ongoing security awareness training<\/h3>\n<p>Every IT security expert will tell you that people are usually the weakest link in the IT security chain. Even though we all like to think we\u2019re not, people are generally susceptible to social engineering-style attacks such as phishing, spear phishing, baiting, and scareware.<\/p>\n<p>That\u2019s why regular security awareness training to keep best practices in mind and educate users about emerging threats is a must for any organization. But it\u2019s often not enough to have a one-hour session yearly, either. Try to choose a security awareness solution that includes regular training and testing for collaborators throughout the year.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>5. Conduct regular, ongoing threat assessments<\/h3>\n<p>Threat assessments (TAs) are an age-old IT security practice that has never gone out of style. That\u2019s because performing a TA helps identify gaps in your current security posture before bad actors do.<\/p>\n<p>Running regular, ongoing TAs and vulnerability scans helps ensure your current measures are effective while helping you make more informed choices around security, expense, and performance.<\/p>\n<p>Those in the media and entertainment space can get a third-party TA through the Motion Picture Association\u2019s <a href=\"https:\/\/massive.io\/newsroom\/trusted-partner-network-tpn\/\">Trusted Partner Network (TPN)<\/a> \u2014 MASV did this last year and received Gold Shield Status \u2014 which evaluates your system to ensure you\u2019re up to date on cybersecurity best practices and requirements.<\/p>\n<p>[\/et_pb_text][et_pb_cta title=&#8221;Secure Large File Transfer for Remote Teams&#8221; button_url=&#8221;https:\/\/app.massive.io\/en\/signup&#8221; button_text=&#8221;Sign-Up for MASV&#8221; module_class=&#8221;starttrial&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_font=&#8221;||||||||&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.3em&#8221; background_color=&#8221;#202332&#8243; background_color_gradient_start=&#8221;#3d72e7&#8243; background_color_gradient_end=&#8221;#202332&#8243; background_color_gradient_direction=&#8221;206deg&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_use_color_gradient=&#8221;on&#8221; button_bg_color_gradient_start=&#8221;#3d72e7&#8243; button_bg_color_gradient_end=&#8221;#53a0fe&#8221; button_bg_color_gradient_direction=&#8221;293deg&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;50px&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;10px|42px|10px|42px|true|true&#8221; custom_margin=&#8221;||20px||false|false&#8221; link_option_url=&#8221;https:\/\/app.massive.io\/en\/signup&#8221; border_width_top=&#8221;10px&#8221; border_color_top=&#8221;#3d72e7&#8243; border_color_left=&#8221;#3d72e7&#8243; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;-13px&#8221; box_shadow_style_button=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221; button_border_width__hover_enabled=&#8221;on|hover&#8221; button_custom_padding__hover_enabled=&#8221;on|hover&#8221; button_custom_padding__hover=&#8221;|2em|||false|false&#8221; button_border_width__hover=&#8221;0px&#8221;]<\/p>\n<p>Encrypt transfers while in-transit and in-storage with MASV. Built on top of premium AWS infrastructure.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;7b1bf5ad-cc2a-4448-981c-4963d88bd6e8&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;1.5em|8%|0px|8%|false|true&#8221; custom_padding_tablet=&#8221;0px|0px|4%|0px|false|true&#8221; custom_padding_phone=&#8221;0px|0px|7%|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_id=&#8221;stages&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;2514b1ee-af07-4bc3-a96b-c9aaa32f4a18&#8243; header_3_font_size=&#8221;26px&#8221; custom_margin=&#8221;||0%||false|false&#8221; custom_margin_tablet=&#8221;||12px||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||||false|false&#8221; custom_padding_tablet=&#8221;||0px||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 data-pm-slice=\"1 1 []\">Security Considerations for Different Stages of Production (Pre, Principal, and Post)<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Now that you have a better idea of the different forms of film production security, here\u2019s a quick snapshot of how it applies to the various stages of production:<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Pre-Production<\/h3>\n<ul>\n<li>Assess risks associated with shooting locations. For example, are you shooting in a large public space? Can bystanders record your production?<\/li>\n<li>Complete background checks on staff; source vendors with appropriate security measures in place and\/or certifications.<\/li>\n<li>Use secure and encrypted cloud tools when sharing\/reviewing assets (storyboards, previs footage, etc.)<\/li>\n<li>Manage permissions and tracking of frequently shared assets like scripts; embed watermarks to create a chain of custody.<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3>Production<\/h3>\n<ul>\n<li>Hire security to direct the flow of traffic among people on-set; install CCTV and fobs to monitor activity.<\/li>\n<li>Define specific roles and responsibilities for everyone on staff; only provide access to key assets\/locations to those who need it.<\/li>\n<li>Require everyone on-set to go through security training to reduce probability of risk.<\/li>\n<li>Implement a closed Wi-Fi network and create locked spaces for staff to secure their devices.<\/li>\n<li>Don\u2019t leave production hardware unattended like on-site RAID storage, camera cards, DIT rigs, and playback monitors.<\/li>\n<li>If <a href=\"https:\/\/massive.io\/alternatives\/hdd-alternative\/\">shipping media<\/a> from site, make sure it\u2019s with a reputable shipping company, purchase loss\/damage insurance, and keep a detailed log of shipping information (bill of lading, drop-off location, delivery date, etc.)<\/li>\n<li>Use a secure, encrypted file transfer solution when sharing files (to post production teams, for review and approval, etc.).<\/li>\n<li>Use a file transfer solution capable of sending large files to avoid file splitting (reduce the amount of files floating around).<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Post-Production<\/h3>\n<ul>\n<li>Ensure everyone on staff has gone through security training.<\/li>\n<li>Keep a record of the number of people on staff and their devices; designate a specific room\/device for use on a specific project (e.g. a single room for color grading, with limited access to room).<\/li>\n<li>Secure access to post production facility and key areas (e.g. server room, etc.).<\/li>\n<li>If employees are remote, take account of their physical security situation (how many people share their space, are devices password-protected, etc.).<\/li>\n<li>Establish rules of what can and cannot be discussed over virtual meetings.<\/li>\n<li>Limit the use of remote software like a VPN or virtual desktops.<\/li>\n<li><strong>Source cloud tools with certified security certifications like ISO 27001<\/strong>. Seek out tools with niche industry accreditations like the Trusted Partner Network assessment for media and entertainment.<\/li>\n<li>Use a secure file transfer solution \u2014 encryption in-flight and at-rest \u2014 when sharing files.<\/li>\n<li>Use a file transfer solution that has security controls like user permissions, file download limits, and file expiry dates.<\/li>\n<li>Use a file transfer solution capable of sending large files to avoid file splitting (reduce the amount of files floating around).<\/li>\n<li>If shipping media, make sure it\u2019s with a reputable company, purchase insurance, and keep a detailed log of shipping information (bill of lading, drop-off location, delivery date, etc.).<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_cta title=&#8221;File Transfer for Your Entire Production Workflow&#8221; button_url=&#8221;https:\/\/app.massive.io\/en\/signup&#8221; button_text=&#8221;Sign-Up for MASV&#8221; module_class=&#8221;starttrial&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_font=&#8221;||||||||&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.3em&#8221; background_color=&#8221;#202332&#8243; background_color_gradient_start=&#8221;#3d72e7&#8243; background_color_gradient_end=&#8221;#202332&#8243; background_color_gradient_direction=&#8221;206deg&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#FFFFFF&#8221; button_bg_use_color_gradient=&#8221;on&#8221; button_bg_color_gradient_start=&#8221;#3d72e7&#8243; button_bg_color_gradient_end=&#8221;#53a0fe&#8221; button_bg_color_gradient_direction=&#8221;293deg&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;50px&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;10px|42px|10px|42px|true|true&#8221; custom_margin=&#8221;||20px||false|false&#8221; link_option_url=&#8221;https:\/\/app.massive.io\/en\/signup&#8221; border_width_top=&#8221;10px&#8221; border_color_top=&#8221;#3d72e7&#8243; border_color_left=&#8221;#3d72e7&#8243; box_shadow_style=&#8221;preset2&#8243; box_shadow_horizontal=&#8221;-13px&#8221; box_shadow_style_button=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221; button_border_width__hover_enabled=&#8221;on|hover&#8221; button_custom_padding__hover_enabled=&#8221;on|hover&#8221; button_custom_padding__hover=&#8221;|2em|||false|false&#8221; button_border_width__hover=&#8221;0px&#8221;]<\/p>\n<p>Fast, easy, and secure large file delivery from set through to post-production.<\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;7b1bf5ad-cc2a-4448-981c-4963d88bd6e8&#8243; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;1.5em|8%|0px|8%|false|true&#8221; custom_padding_tablet=&#8221;0px|0px||0px|false|true&#8221; custom_padding_phone=&#8221;0px|0px|0px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_id=&#8221;wrong&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;2514b1ee-af07-4bc3-a96b-c9aaa32f4a18&#8243; header_3_font_size=&#8221;26px&#8221; custom_margin=&#8221;||0%||false|false&#8221; custom_margin_tablet=&#8221;||12px||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||||false|false&#8221; custom_padding_tablet=&#8221;||0px||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 data-pm-slice=\"1 1 []\">What to Do if Something Goes Wrong?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Even organizations that take every security precaution possible must acknowledge that the unthinkable \u2013 a data breach \u2013 is just one mistake away. Organizations must have security breach plans in place to limit the damage of any disruptions, including the following:<\/p>\n<ul>\n<li><strong>Incident reviews<\/strong>: Review all incidents to identify potential perimeter or procedural weaknesses and update security measures and training based on what happened. Scrutinize the specifics of the breach (including the Five Ws) to determine what must be corrected.<\/li>\n<li><strong>Log reviews<\/strong>: Regular reviews of access logs around restricted areas or storage can help identify abnormal behavior when it occurs. Log reviews are a must in case of a breach, but regular and ongoing reviews can also reduce damages by catching incidents sooner.<\/li>\n<li><strong>Anonymous reporting<\/strong>: Staff and contractors should have access to a vehicle (phone number, email, etc.) for anonymously reporting potential security breaches.<\/li>\n<li><strong>Incident response<\/strong>: Follow a well-choreographed procedure if assets are compromised, including alerting the appropriate stakeholders and law enforcement (if necessary).<\/li>\n<li><strong>Insurance<\/strong>: Hope for the best and plan for the worst, as the saying goes. Get a good production insurance policy (which you may need anyway to even get contracts with some studios) just in case.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.14.7&#8243; custom_padding=&#8221;0px|8%|0px|8%|false|true&#8221; custom_padding_tablet=&#8221;|0%||0%|false|true&#8221; custom_padding_phone=&#8221;|0%||0%|false|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;7b1bf5ad-cc2a-4448-981c-4963d88bd6e8&#8243; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;1.5em|8%|0px|8%|false|true&#8221; custom_padding_tablet=&#8221;4%|0px||0px|false|true&#8221; custom_padding_phone=&#8221;7%|0px||0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text module_id=&#8221;masv&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;2514b1ee-af07-4bc3-a96b-c9aaa32f4a18&#8243; header_3_font_size=&#8221;26px&#8221; custom_margin=&#8221;||0%||false|false&#8221; custom_margin_tablet=&#8221;||12px||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px||||false|false&#8221; custom_padding_tablet=&#8221;||0px||false|false&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 data-pm-slice=\"1 1 []\">How MASV Helps Secure Film Production (The File Transfer Part, Anyway)<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>While <a href=\"https:\/\/massive.io\/\" class=\"notion-link-token notion-enable-hover\" target=\"_blank\" rel=\"noopener noreferrer\" data-token-index=\"1\" data-reactroot=\"\"><span class=\"link-annotation-unknown-block-id-1428208144\">MASV<\/span><\/a> can\u2019t secure your entire production workflow, it\u2019s an absolute star at keeping your file transfers locked up tight.<\/p>\n<p>That\u2019s because MASV is an ISO 27001-certified, TPN-verified enterprise-grade large file transfer service built for <a href=\"https:\/\/massive.io\/industries\/post-production\/\">post-production and other video professionals<\/a>.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/massive.io\/wp-content\/uploads\/2022\/11\/masv-laptop-open-graph.jpg&#8221; alt=&#8221;A half-closed laptop with the MASV logo displayed on top&#8221; title_text=&#8221;masv-laptop-open-graph&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>That\u2019s because MASV is an ISO 27001-certified, TPN-verified enterprise-grade large file transfer service built for <a href=\"https:\/\/massive.io\/industries\/post-production\/\">post-production and other video professionals<\/a>.<\/p>\n<p>MASV\u2019s extensive cybersecurity posture includes:<\/p>\n<ul>\n<li>In-flight and at-rest encryption of all media through TLS 1.2 and AES-256.<\/li>\n<li>Automatic malware and virus scanning of every media upload.<\/li>\n<li>Password protection on uploads and downloads.<\/li>\n<li><a href=\"https:\/\/help.massive.io\/en\/how-do-i-set-up-and-manage-multi-factor-authentication-mfa-in-masv\">Multi-factor authentication (MFA)<\/a>, which offers greater protection by asking for additional credentials (not just a login and password). For even stronger security and convenience you can combine MFA with SAML-based Single Sign-On (SSO).<\/li>\n<li>Team alerts whenever an internal admin attempts to log into the MASV system. All admin log-in attempts require MFA, crypto keys, or token-based authentication to maintain proper access control.<\/li>\n<li>Regular, ongoing vulnerability scanning and threat assessments.<\/li>\n<li>Precise file delivery tracking for chain-of-custody requirements.<\/li>\n<li>Strict access controls like set download limits and file expiry dates.<\/li>\n<\/ul>\n<p>Because MASV is based on the AWS cloud platform, it also piggybacks on <a href=\"https:\/\/aws.amazon.com\/security\/\" target=\"_blank\" rel=\"noopener\">AWS\u2019s cloud-based and on-premises security protocols<\/a>.<\/p>\n<p>Ready to get started? <a href=\"https:\/\/app.massive.io\/en\/signup\">Sign up today<\/a> and transfer using MASV. <span data-sheets-root=\"1\">Get free transfer credits when you sign up.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.14.7&#8243; custom_padding=&#8221;0px|8%|0px|8%|false|true&#8221; custom_padding_tablet=&#8221;|0%||0%|false|true&#8221; custom_padding_phone=&#8221;|0%||0%|false|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|8%||8%|false|true&#8221; custom_padding_tablet=&#8221;|0%||0%|false|true&#8221; custom_padding_phone=&#8221;|0%||0%|false|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_cta title=&#8221;MASV Large File Transfer&#8221; button_url=&#8221;https:\/\/app.massive.io\/en\/signup&#8221; button_text=&#8221;Sign-Up for MASV&#8221; module_class=&#8221;starttrial&#8221; _builder_version=&#8221;4.14.7&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_font=&#8221;||||||||&#8221; header_font_size=&#8221;27px&#8221; header_line_height=&#8221;1.3em&#8221; background_enable_color=&#8221;off&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#3d72e7&#8243; background_color_gradient_end=&#8221;#53a0fe&#8221; background_color_gradient_direction=&#8221;292deg&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#3d72e7&#8243; button_bg_color=&#8221;#FFFFFF&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;50px&#8221; button_use_icon=&#8221;off&#8221; button_custom_padding=&#8221;10px|42px|10px|42px|true|true&#8221; link_option_url=&#8221;https:\/\/app.massive.io\/en\/signup&#8221; box_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221; button_border_width__hover_enabled=&#8221;on|hover&#8221; button_custom_padding__hover_enabled=&#8221;on|hover&#8221; button_custom_padding__hover=&#8221;|2em|||false|false&#8221; button_border_width__hover=&#8221;0px&#8221;]<\/p>\n<p><span data-sheets-root=\"1\">Get free transfer credits when you sign up.<\/span><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Consulta nuestra gu\u00eda de consideraciones para reforzar la seguridad de la producci\u00f3n de cine y televisi\u00f3n, con consejos sobre qu\u00e9 hacer durante la preproducci\u00f3n, la producci\u00f3n principal y la postproducci\u00f3n.<\/p>","protected":false},"author":14,"featured_media":119116,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[258],"tags":[],"class_list":["post-119103","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-content-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/massive.io\/es\/wp-json\/wp\/v2\/posts\/119103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/massive.io\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/massive.io\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/massive.io\/es\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/massive.io\/es\/wp-json\/wp\/v2\/comments?post=119103"}],"version-history":[{"count":0,"href":"https:\/\/massive.io\/es\/wp-json\/wp\/v2\/posts\/119103\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/massive.io\/es\/wp-json\/wp\/v2\/media\/119116"}],"wp:attachment":[{"href":"https:\/\/massive.io\/es\/wp-json\/wp\/v2\/media?parent=119103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/massive.io\/es\/wp-json\/wp\/v2\/categories?post=119103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/massive.io\/es\/wp-json\/wp\/v2\/tags?post=119103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}