Data Security and Encryption

Slides:



Advertisements
Similar presentations
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Encryption – First line of defense Plamen Martinov Director of Systems and Security.
Springfield Technical Community College Security Awareness Training.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Security Computing Practices Plamen Martinov Chief Information Security Officer.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
THE WHY AND HOW OF DATA SECURITY YOUR ROLE IN DATA STEWARDSHIP DEPARTMENT OF MEDICINE IT SERVICES.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
ENCRYPTION Coffee Hour for August HISTORY OF ENCRYPTION Scytale Ciphers – paper wrapped around rod, receiver needed same size rod to get the message.
Protecting Sensitive Information PA Turnpike Commission.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Week #7 Objectives: Secure Windows 7 Desktop
Troubleshooting Windows Vista Security Chapter 4.
University Health Care Computer Systems Fellows, Residents, & Interns.
SPH Information Security Update September 10, 2010.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
What lessons can we learn from other data breaches? Target Sentry Insurance Dynacare Laboratories 1 INTRODUCTION.
Secure Computing Practices Karl Rademacher Director of Security, BSD.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Reviewed by: Gunther Kohn Chief Information Officer, UB School of Dental Medicine Date: October 20, 2015 Approved by: Sarah L. Augustynek Compliance Officer,
Information Security Awareness Training
UNM Encryption Services in Development
Computers in the Ambulatory Care Setting
HIPAA Privacy and Security
Protecting PHI & PII 12/30/2017 6:45 AM
DATA SECURITY FOR MEDICAL RESEARCH
East Carolina University
WikID installation/training
Information Protection & Cyber Security
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
A Parent Guide to creating a student (under 13) Apple ID
Installation & User Guide
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Encryption The Good kind of obscurity
Passwords.
Data Security and Encryption
County HIPAA Review All Rights Reserved 2002.
Preparing for GDPR Sharing experiences of the process and using the British Canoeing Toolkit bit.ly/BCGDPRToolkit
Information Security Awareness
Mysale Information Classification 101
Protecting Your Company’s Most Valuable Asset
Have you seen this screen?
Technology Solutions Cybersecurity Report to the KCTCS Board of Regents March 14, 2019.
Introduction to the PACS Security
Data Security, Encryption, and User Awareness
Information Security in Your Office
School of Medicine Orientation Information Security Training
Presentation transcript:

Data Security and Encryption Plamen Martinov Chief Information Security Officer, BSD

Agenda Who is Hacking Us and Why “Top 10 List” of Good Computing Security Practices How to: Setup 2-Factor Authentication (2FA) Set a good password Encrypt sensitive information

Healthcare mega-breaches Who is Hacking Us and Why 2013 800,000,000+ records breached, with no signs of decreasing in the future 2014 1,000,000,000 records breached, while CISOs cite increasing risks from external threats 2015-16 Healthcare mega-breaches set the trend for high value targets of sensitive information Price for sensitive data on the black-market per record: $1 for Credit Card Numbers $10 for Social Security Numbers $50 for Partial Heath Credentials $300 for Patient Health Information Source: IBM X-Force Threat Intelligence Report - 2016

Who is Hacking Us and Why Cyber Criminals Broad-based and targeted Financially motivated Getting more sophisticated Hacktivists Targeted and destructive Unpredictable motivations Generally less sophisticated Nation States Targeted and multi-stage Motivated by data collection Highly sophisticated with endless sources Insiders Targeted and destructive Unpredictable motivations Sophistication varies

"Top 10 List" of Good Computing Security Practices to Protect Computers and Data. Choose good passwords and keep them secure Sign-up and use 2 Factor Authentication Encrypt all ePHI or PII stored on portable devices (e.g. laptops, usb etc) Password protect your computer and portable devices. Do not respond to anyone asking you for your password Keep your operating system patched and up-to-date Install anti-virus and keep it up-to-date Turn on your computer firewall Back up your data to a secure location Securely delete ePHI and PII when it is no longer needed

Setup Two-Factor Authentication (2FA) What is Two-Factor Authentication (2FA)? When a user logs into an account, that account uses one or more authentication factors in order to verify the identity of an authorized user. BSD and UChicago 2FA available for employees: UChicago: Secures your CNet account for cVPN and other secured applications Sign up at https://2fa.uchicago.edu BSD: Secures your BSDAD account for BSD VPN and other secured applications Sign up at https://2fa.bsd.uchicago.edu/ FAQ sheet is on the BSD ISO website at http://security.bsd.uchicago.edu/bsd2fa/ You are required to enroll in 2FA. Applications you can’t access without 2FA: Workday, UChicagoBox, VPN

Set a Good Password Creating a good password Combine 2 unrelated words -> Mail + phone = m@!lf0n3 A good password has at least 12 characters = m@!lf0n-2015 Use a password or passphrase manager, such as LastPass to help manage multiple passwords/passphrases The table below shows how fast your password can be guessed by a hacker: Pattern Calculation Result Time to Guess 8 chars: lower case alpha 268 2x1011 < 1 second 8 chars: alphanumeric 628 2x1014 3.4 min 8 chars: all keyboard 958 7x1015 2 hours 12 chars: alphanumeric 6212 3x1021 96 years

Encryption vs. Passwords Having a password does not necessarily mean something is encrypted. Passwords by themselves do not scramble the information. If something is only “password protected,” it is not enough protection - someone could bypass the password and read the information. Original Password Protected Encrypted

Encrypt Any Restricted and or Sensitive Information Stored on Portable Devices Restricted / Confidential ePHI or electronic Protected Health Information (Personal + Health) Names, Medical Record Numbers, reports, test results, or appointment dates etc. PII or Personally Identified Information Name, SSN, driver’s license number etc. Clinical Research Data Privileged & Confidential Information (legal) Sensitive / Internal Use Only Policies and Procedures IT schematics, diagrams, configuration documents Contracts not subject to confidentiality agreements Public Content approved for posting to the web Directory Information listed on a public website When the classification is not clearly defined, default to Sensitive unless defined in writing by your supervisor.

Encryption saves the University both time and money The table below shows the time and costs for handling security incidents for lost and stolen devices. Encrypted Device with ePHI/PII Unencrypted Device with ePHI/PII Unencrypted Device without ePHI/PII Incident Description User’s computer stolen from his/her car. Device had ~400 patient records. User forgot laptop in cab. Device had ~400 patient records. User left tablet on plane. Device had no patient health information. Investigation time (combined hours for incident response team – legal, HR, IT, security, etc.) 1 Hour 50 hours 35 hours Security Forensics Costs $ 0 $ 2,000 $ 800 Reputation Damage Costs Priceless

Encrypt Portable Devices to Protect Sensitive Information (cont’d) Type Encryption Solutions Cost/Impact How Apple File Vault 2 Encrypt the contents of your entire drive. Solution will work for personally-owned and BSD-owned laptops. Strong AES 128 based encryption. can store recover key with Apple; well-documented install guide. Choose Apple menu () > System Preferences, then click Security & Privacy. Click the FileVault tab. Click the Lock  button, then enter an administrator name and password. Click Turn On FileVault. Windows BitLocker Strong encryption for data protection. Some hardware and software dependencies. Click Start, click Control Panel, click Security, and then click BitLocker Drive Encryption. On the BitLocker Drive Encryption page, click Turn On BitLocker on the operating system volume. If your TPM is not initialized, you will see the Initialize TPM Security Hardware wizard. Follow the directions to initialize the TPM and restart your computer. Select one of the following recover options from the recovery password page, you will see the following options: Saves the password to a USB flash drive. Saves the password to a network drive or other location. Print the password

Encrypt Portable Devices to Protect Sensitive Information (cont’d) Type Encryption Solutions Use/Features How External Storage Apricorn Aegis USB Secures the transport of data, documents, and presentations. Strong, 256-bit AES hardware-based encryption; unlocks with onboard PIN pad; PIN activated 7-15 digits -Alphanumeric keypad. Purchase through University procurement or on you own from Amazon, Staples or any other major IT equipment provider. Apple Phone/ Tablet IOS Work for personally- owned and BSD-owned devices Native security feature, enabled by default with the use of passcode; vendor-supported Strong, 256-bit AES hardware-based encryption Can store recover key with Apple Set a passcode on phone Scroll down to the bottom of the Passcode settings page. You should see a message that says “Data protection enabled.” This means that the device's encryption is now tied to your passcode. Android Phone/ Tablet Android Easy setup, but not enabled by default Well-documented install guide. Your device’s battery must be at least 80% charged or won’t start. Your device must be plugged in throughout the entire process. Unroot phone if rooted before continuing. Following your manufacture’s steps to complete the encryption.

Summary How to reach us: Web Site: http://security.bsd.uchicago.edu Everyone has a part in safeguarding Protected Information. Good Computing Security Practices follow the “90 /10”Rule: 10% of security safeguards are technical 90% of security safeguards rely on the computer user (“YOU”) to adhere to good computing practices How you can help: Encrypt your portable devices and any sensitive information. Sign up for 2 Factor Authentication Following good hygiene security practices i.e. "Top 10 List" of Good Computing Security Practices Report security incidents including lost/stolen devices to the BSD Information Security teams. How to reach us: Web Site: http://security.bsd.uchicago.edu BSD ISO Team Email: security@bsd.uchicago.edu UCM ISO Team Email: security@uchospitals.edu Plamen Martinov (773) 834-1714 pmartinov@bsd.uchicago.edu