Steve Garner Ag Communications Services IT Manager Concentration on Securing ‘Sensitive Data’ Social security numbers Youth data Credit Card/Financial Info Home Addresses, DOB.
Download
Report
Transcript Steve Garner Ag Communications Services IT Manager Concentration on Securing ‘Sensitive Data’ Social security numbers Youth data Credit Card/Financial Info Home Addresses, DOB.
Steve Garner
Ag Communications Services
IT Manager
Concentration on Securing
‘Sensitive Data’
Social security numbers
Youth data
Credit Card/Financial Info
Home Addresses, DOB
Securing PII data
Personal
Professional
Account List
Account numbers
Passwords
User IDs
Academic Records
Grades
Student Information
Company name
Transcripts
Financial Data
Quicken files
Taxes
Cancelled checks
Legal Documents
Birth certificates
Passports
Credit Card photos
SSN/PUID
Recommendation letters
Academic challenge materials
Research Data
Names of children
Survey results
Why are we doing this?
LAWSUITS?
Lost/stolen computing devices/data
Hackers and Malware
Must reduce the number of electronic files available
Protect our clientele
Assure them that PII is safe with CES
Acceptable Use Policy
The UK Acceptable Use Policy contains official
guidelines for the responsible use of information
technology resources at the University.
The Acceptable Use Policy describes your rights and
responsibilities when using and accessing university
resources.
Acceptable Use Policy
http://www.uky.edu/regs/files/ar/ar10-1.pdf
Layered Defense
Update Software
Use Antivirus Software
Use Strong Passwords
Secure your Physical Environment and Encrypt
Sensitive Data
Keep Wireless Devices Secure
Practice Online Safety
Back Up Your Data
Update Software
Operating Systems and Applications
Auto Update Win XP and Win 7
Update software on mobile devices too
Restart Computer ? YES!!!
Antivirus Software
Keep Forefront up to date
Microsoft Forefront can be downloaded at
http://download.uky.edu
Sensitive Data Locations?
My Documents, Ctyfile, and other folders on hard
drives/media, Access databases
Email
Folders
Sent items
Archives
Deleted items/Trash
Backups on portable media
Flash drives
Servers
What to do
Delete unneeded files
Empty recycle bin
Print and store information then delete source file
Consolidate needed files to minimize locations
Encrypt and/or password protect sensitive files
Don’t keep inactive old devices around
Wipe old hard drives before reusing hardware or
disposal
Password Guidelines
Don’t always use the same password
Don’t share your passwords
Don’t email it to anyone for any reason
Use Strong Passwords
At least 8 characters long
Avoid dictionary words, phrases, quotes, etc.
Mix of upper and lower case letters
Use number and non-letter characters
File Protection
Password protect/encrypt Office files that contain
sensitive information
Can encrypt any file/folder on computer
Encrypt sensitive information that HAS to be stored
Encryption
--The process of converting messages, information, or data
into a form unreadable by anyone except the intended
recipient.
encryption—crypt—comes from the Greek
word kryptos, meaning hidden or secret
About 1900 BC An Egyptian scribe used non-standard
hieroglyphs in an inscription. This is the first documented
example of written cryptography.
So nothing new about encryption!
Automatic Encryption
BitLocker
Windows 7
Secures entire drive in background
TrueCrypt
Free open-source disk encryption
www.truecrypt.org
What is True Crypt
Free open-source disk encryption software for
Windows, Mac OS X
Main Features: Creates a virtual encrypted disk
within a file.
Encryption is automatic, real-time (on the fly)
and transparent.
Parallelization and pipelining allow data to be
read and written as fast as if the drive was not
encrypted.
Hidden volume
Mobile device Security
Password protect the login
Encrypt sensitive data
Automatic Encrypted flash drives are available
Physically secure with lock
Location Services: find myiPhone(iPad, etc.) also
similar products for Android devices(Prey)
Public Wireless
•
•
•
•
•
•
•
Airports
Hotels
Coffee Shops
Bookstores
Neighbors Access Point
Use UK’s site licensed VPN Client
http://download.uky.edu
Cisco VPN Client for Windows
Practice Online Safety
Only download what you trust, and even then be
wary.
Limit what you download to your work computer
Don’t accept downloads from strangers
What else are you getting with the “free” stuff?
“Free” music and file sharing programs are wide
open doors for hackers.
Backup Your Data
It’s not a matter of IF, it’s a matter of when.
Non-technical Protections
Lock your doors
Hide your valuables
Make your device hard to lose
Attach to keychain
Lanyard
Whatever helps
Questions?