{"id":6615,"date":"2017-02-28T17:02:00","date_gmt":"2017-02-28T17:02:00","guid":{"rendered":"https:\/\/www.investintech.com\/resources\/blog\/?p=6615"},"modified":"2023-02-20T14:36:35","modified_gmt":"2023-02-20T14:36:35","slug":"pdf-security-essentials","status":"publish","type":"post","link":"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html","title":{"rendered":"PDF Security Essentials: What You Should Know"},"content":{"rendered":"<p><a href=\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2014\/03\/Technology-Security-Key.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4911\" src=\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2014\/03\/Technology-Security-Key.jpg\" alt=\"Securing Technology\" width=\"602\" height=\"399\" srcset=\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2014\/03\/Technology-Security-Key.jpg 500w, https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2014\/03\/Technology-Security-Key-300x198.jpg 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/a><\/p>\n<p>There\u2019s an undeniable love-hate relationship we have with PDFs. You hate it because you can\u2019t easily interact with the content that\u2019s in it; you love it because it can keep that content intact. And for better or worse, that dichotomy is the format\u2019s strength.<\/p>\n<p><!--more--><\/p>\n<p>Yet oftentimes you don\u2019t realize how secured or unsecured your PDF content is. Many <a href=\"https:\/\/www.investintech.com\/resources\/blog\/archives\/4909-4-common-pdf-facts.html\">PDF myths<\/a> exist, one of them being that the PDF is naturally secured. But it isn\u2019t. One way to tell the difference between a regular PDF vs. secure PDF documents is to quickly open it in a <a href=\"\/resources\/freetools\/slimpdfreader\/\">PDF viewer<\/a> and see if it says \u201cSecured\u201d in the viewer toolbar. \u00a0The absence of this alone is reason enough to be extra vigilant with PDF security, but there are other more compelling reasons if that isn\u2019t enough.<\/p>\n<h2><strong>Why PDF Documents Need Security<\/strong><\/h2>\n<p><a href=\"http:\/\/www.theregister.co.uk\/2016\/01\/17\/pdf_redaction_is_hard_nsw_medical_council_finds_out_the_hard_way\/\" target=\"_blank\" rel=\"nofollow\">Improper PDF redaction<\/a>, for example, is a misunderstood security feature with heavy consequences if not done properly. Drawing or placing a black filled rectangle over text doesn\u2019t mean that it can\u2019t be accessed.<\/p>\n<p>Digital trends in the workplace are also ripe for security holes as not all gaps can be covered in your company\u2019s <a href=\"http:\/\/www.csoonline.com\/article\/3105572\/security\/6-shocking-gaps-in-your-data-security-strategy.html\" target=\"_blank\" rel=\"nofollow\" class=\"broken_link\">data security strategy<\/a>. This includes mobile access, accidental recipients, and employee negligence.<\/p>\n<p><a href=\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2013\/12\/Creating-Paperless-Office.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4633\" src=\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2013\/12\/Creating-Paperless-Office.png\" alt=\"Creating Paperless Office\" width=\"568\" height=\"262\" srcset=\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2013\/12\/Creating-Paperless-Office.png 520w, https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2013\/12\/Creating-Paperless-Office-300x138.png 300w\" sizes=\"auto, (max-width: 568px) 100vw, 568px\" \/><\/a><\/p>\n<p>And as much as we advocate a <a href=\"http:\/\/www.huffingtonpost.com\/chris-strammiello\/3-document-to-dos-to-prot_b_14395450.html\" target=\"_blank\" rel=\"nofollow\">paperless office<\/a>, transitioning towards one is often the stage in which scanning and turning hardcopy documents into a PDF leaves security doors wide open.<\/p>\n<p>Lessening privacy risks is all about determining how your document content is vulnerable, and a document\u2019s lifecycle contains a number of potential risks along the way.<\/p>\n<p>Now that you have a few ideas of where PDF security barriers are the weakest, you may be asking yourself what security measures can you add to your PDF documents?<\/p>\n<h2><strong>The PDF Security Solution<\/strong><\/h2>\n<p>There are security basics that should never be overlooked or dismissed. If your content is significant enough to be put into a PDF, then it should be significant enough to secure. \u00a0A few quick ways to secure your PDF file:<\/p>\n<p style=\"padding-left: 30px;\">\u2022<strong> Create User Passwords<\/strong> &#8211; This is the simplest way to filter out your intended recipients from prying eyes. With a password, your content is locked and should be your first security barrier. Knowing <a href=\"https:\/\/www.investintech.com\/resources\/blog\/archives\/6422-how-to-password-protect-a-pdf-guide.html\">how to password protect a PDF<\/a>\u00a0can help secure your information at the most basic level.<\/p>\n<p style=\"padding-left: 30px;\">\u2022<strong> Create File Permissions<\/strong>&#8211; Another level of security for your content should your file be accidentally accessed. While people may be able to view it, ensure that viewing is all they can do with it. Restrict activities from printing content to copying text. Checking the PDF\u2019s Properties dialog, users can see what permissions are given to the file, if any.<\/p>\n<p style=\"padding-left: 30px;\">\u2022 <strong>Proper PDF Redaction<\/strong>&#8211; Use dedicated PDF redaction tools to <a href=\"https:\/\/xodo.com\/redact-pdf\" target=\"_blank\" rel=\"nofollow\">redact PDF text<\/a> properly. As discussed above, the text may still be accessible underneath any makeshift black rectangles you insert.<\/p>\n<p><a href=\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2016\/12\/whats-new-a2epro11-selectively-redact-pdf-data.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6561\" src=\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2016\/12\/whats-new-a2epro11-selectively-redact-pdf-data.png\" alt=\"Redacting PDF Data\" width=\"480\" height=\"320\" srcset=\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2016\/12\/whats-new-a2epro11-selectively-redact-pdf-data.png 480w, https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2016\/12\/whats-new-a2epro11-selectively-redact-pdf-data-300x200.png 300w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/a><\/p>\n<p style=\"padding-left: 30px;\">\u2022 <strong>PDF Encryption<\/strong> &#8211; In cases, where you\u2019re collaborating around contracts (real estate, business) that need revision or signing. Able2Extract Professional will allow you to encrypt existing PDFs if you need to edit, re-encrypt and share or decrypt, modify and re-share that content for collaboration.<\/p>\n<p><a href=\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2016\/12\/Encrypt-PDF-Options.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6535\" src=\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2016\/12\/Encrypt-PDF-Options.png\" alt=\"Enhanced PDF Security\" width=\"454\" height=\"339\" srcset=\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2016\/12\/Encrypt-PDF-Options.png 454w, https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2016\/12\/Encrypt-PDF-Options-300x224.png 300w\" sizes=\"auto, (max-width: 454px) 100vw, 454px\" \/><\/a><\/p>\n<p style=\"padding-left: 30px;\">\u2022 <strong>Add a Watermark to PDF pages<\/strong> &#8211; Let\u2019s not forget that some tools exist to remove PDF security features. As a last line of defense, a <a href=\"https:\/\/www.investintech.com\/resources\/blog\/archives\/6577-add-watermark-pdf-documents.html\">PDF watermark<\/a> can help to discourage printing or distribution of your content when all else fails.<\/p>\n<p>Interested in keeping your PDF information secure? Learn more about Able2Extract Professional\u2019s <a href=\"https:\/\/www.investintech.com\/prod_a2e.htm\">security features<\/a> and download a <a href=\"https:\/\/www.investintech.com\/prod_downloadsa2e.htm\">free trial<\/a> to test them out for yourself.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s an undeniable love-hate relationship we have with PDFs. You hate it because you can\u2019t easily interact with the content that\u2019s in it; you love it because it can keep that content intact. And for better or worse, that dichotomy is the format\u2019s strength.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[267,19,24,65,98,59],"class_list":["post-6615","post","type-post","status-publish","format-standard","hentry","category-12-pdf-security","tag-document-management","tag-pdf-creation","tag-secure-pdf","tag-security","tag-technology","tag-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PDF Security Essentials: What You Should Know<\/title>\n<meta name=\"description\" content=\"PDF security is often overlooked, but it&#039;s something that shouldn\u2019t be ignored. Explore why PDFs should be secured and get tips on how to secure PDF files.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PDF Security Essentials: What You Should Know\" \/>\n<meta property=\"og:description\" content=\"PDF security is often overlooked, but it&#039;s something that shouldn\u2019t be ignored. Explore why PDFs should be secured and get tips on how to secure PDF files.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html\" \/>\n<meta property=\"og:site_name\" content=\"PDF Blog | Investintech PDF Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-28T17:02:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-20T14:36:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2014\/03\/Technology-Security-Key.jpg\" \/>\n<meta name=\"author\" content=\"Reena\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@able2extract\" \/>\n<meta name=\"twitter:site\" content=\"@able2extract\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html\"},\"author\":{\"name\":\"Reena\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/9d21ba7980d32dbd36069a4878f8e409\"},\"headline\":\"PDF Security Essentials: What You Should Know\",\"datePublished\":\"2017-02-28T17:02:00+00:00\",\"dateModified\":\"2023-02-20T14:36:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html\"},\"wordCount\":607,\"publisher\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2014\/03\/Technology-Security-Key.jpg\",\"keywords\":[\"Document Management\",\"PDF creation\",\"secure PDF\",\"security\",\"technology\",\"tips\"],\"articleSection\":[\"PDF Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html\",\"url\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html\",\"name\":\"PDF Security Essentials: What You Should Know\",\"isPartOf\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2014\/03\/Technology-Security-Key.jpg\",\"datePublished\":\"2017-02-28T17:02:00+00:00\",\"dateModified\":\"2023-02-20T14:36:35+00:00\",\"description\":\"PDF security is often overlooked, but it's something that shouldn\u2019t be ignored. Explore why PDFs should be secured and get tips on how to secure PDF files.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html#primaryimage\",\"url\":\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2014\/03\/Technology-Security-Key.jpg\",\"contentUrl\":\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2014\/03\/Technology-Security-Key.jpg\",\"width\":500,\"height\":331,\"caption\":\"Securing Technology\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.investintech.com\/resources\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PDF Security Essentials: What You Should Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#website\",\"url\":\"https:\/\/www.investintech.com\/resources\/blog\/\",\"name\":\"PDF Blog | Investintech PDF Solutions\",\"description\":\"Everything PDF\",\"publisher\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.investintech.com\/resources\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#organization\",\"name\":\"PDF Blog | Investintech PDF Solutions\",\"url\":\"https:\/\/www.investintech.com\/resources\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2024\/12\/Investintech-apryse-logo-w270.webp\",\"contentUrl\":\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2024\/12\/Investintech-apryse-logo-w270.webp\",\"width\":270,\"height\":40,\"caption\":\"PDF Blog | Investintech PDF Solutions\"},\"image\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/able2extract\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/9d21ba7980d32dbd36069a4878f8e409\",\"name\":\"Reena\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aceff76f1b124f7ffb271de50b78f12a7599655c7087ea3a656b61cf9a89c376?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aceff76f1b124f7ffb271de50b78f12a7599655c7087ea3a656b61cf9a89c376?s=96&d=mm&r=g\",\"caption\":\"Reena\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PDF Security Essentials: What You Should Know","description":"PDF security is often overlooked, but it's something that shouldn\u2019t be ignored. Explore why PDFs should be secured and get tips on how to secure PDF files.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html","og_locale":"en_US","og_type":"article","og_title":"PDF Security Essentials: What You Should Know","og_description":"PDF security is often overlooked, but it's something that shouldn\u2019t be ignored. Explore why PDFs should be secured and get tips on how to secure PDF files.","og_url":"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html","og_site_name":"PDF Blog | Investintech PDF Solutions","article_published_time":"2017-02-28T17:02:00+00:00","article_modified_time":"2023-02-20T14:36:35+00:00","og_image":[{"url":"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2014\/03\/Technology-Security-Key.jpg","type":"","width":"","height":""}],"author":"Reena","twitter_card":"summary_large_image","twitter_creator":"@able2extract","twitter_site":"@able2extract","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html#article","isPartOf":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html"},"author":{"name":"Reena","@id":"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/9d21ba7980d32dbd36069a4878f8e409"},"headline":"PDF Security Essentials: What You Should Know","datePublished":"2017-02-28T17:02:00+00:00","dateModified":"2023-02-20T14:36:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html"},"wordCount":607,"publisher":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/#organization"},"image":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html#primaryimage"},"thumbnailUrl":"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2014\/03\/Technology-Security-Key.jpg","keywords":["Document Management","PDF creation","secure PDF","security","technology","tips"],"articleSection":["PDF Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html","url":"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html","name":"PDF Security Essentials: What You Should Know","isPartOf":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html#primaryimage"},"image":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html#primaryimage"},"thumbnailUrl":"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2014\/03\/Technology-Security-Key.jpg","datePublished":"2017-02-28T17:02:00+00:00","dateModified":"2023-02-20T14:36:35+00:00","description":"PDF security is often overlooked, but it's something that shouldn\u2019t be ignored. Explore why PDFs should be secured and get tips on how to secure PDF files.","breadcrumb":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html#primaryimage","url":"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2014\/03\/Technology-Security-Key.jpg","contentUrl":"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2014\/03\/Technology-Security-Key.jpg","width":500,"height":331,"caption":"Securing Technology"},{"@type":"BreadcrumbList","@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/6615-pdf-security-essentials.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.investintech.com\/resources\/blog\/"},{"@type":"ListItem","position":2,"name":"PDF Security Essentials: What You Should Know"}]},{"@type":"WebSite","@id":"https:\/\/www.investintech.com\/resources\/blog\/#website","url":"https:\/\/www.investintech.com\/resources\/blog\/","name":"PDF Blog | Investintech PDF Solutions","description":"Everything PDF","publisher":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.investintech.com\/resources\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.investintech.com\/resources\/blog\/#organization","name":"PDF Blog | Investintech PDF Solutions","url":"https:\/\/www.investintech.com\/resources\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2024\/12\/Investintech-apryse-logo-w270.webp","contentUrl":"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2024\/12\/Investintech-apryse-logo-w270.webp","width":270,"height":40,"caption":"PDF Blog | Investintech PDF Solutions"},"image":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/able2extract"]},{"@type":"Person","@id":"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/9d21ba7980d32dbd36069a4878f8e409","name":"Reena","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/aceff76f1b124f7ffb271de50b78f12a7599655c7087ea3a656b61cf9a89c376?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aceff76f1b124f7ffb271de50b78f12a7599655c7087ea3a656b61cf9a89c376?s=96&d=mm&r=g","caption":"Reena"}}]}},"_links":{"self":[{"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/posts\/6615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/comments?post=6615"}],"version-history":[{"count":8,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/posts\/6615\/revisions"}],"predecessor-version":[{"id":10604,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/posts\/6615\/revisions\/10604"}],"wp:attachment":[{"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/media?parent=6615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/categories?post=6615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/tags?post=6615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}