Secure Transit & Storage HOW TO SECURELY STORE & SEND CONFIDENTIAL DATA by The UTHSC Information Security Team.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
{ Making Microsoft Office work for you Organizing Your Life at work and home in the Cloud Presented by: Matthew Baker (321)
Division of Information Resources Collaborating with Office 365 Storage Options and Classifications.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Introduction to Office 365. Topics Covered What is Office 365? Office 365 Project Overview Office 365 Components Outlook Web App & Logon Process Training.
© Copyright RES Software. v2012-Mar30. RES HyperDrive Patrik Zander, Product Manager 1.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Microsoft Office 4/16/2017 © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Cloud Services for Education
HIPAA Data Security PCF Data Security Update May 1 st, 2015.
Introduction to Office 365
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
SHARESYNCPage 1 of 2 ShareSync is a business-grade file sync and share service Sync files across devices Share files and folders easily and securely Business-grade.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
1.1 System Performance Security Module 1 Version 5.
BARRY JINKS President & CEO March 22, 2011 President & CEO March 22, 2011.
CB Students Student Lync Web Apps Microsoft Office OneDrive Anywhere, Anytime, Anyone.
Built atop SharePoint Online, WorkPoint 365 Offers a Project and Case Management Solution to Boost Business Productivity and Deliver Governance OFFICE.
Easily Organize Common Templates, Phrases, Statements and More to Quickly Reuse Within Microsoft Office 365 Using Dolphin Compose WHAT WE OFFER Replace.
SharePoint ShortUrl and SharePoint Document Merge SharePoint and Office 365 Add-ins to Increase Productivity and Improve User Adoption! OFFICE 365 APP.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
ITS Lunch & Learn November 13, What is Office 365? Office 365 is Microsoft’s software as a service offering. It includes hosted and calendaring.
A leap ahead... Darren Kearney Don Miller Ilya Pinchuk.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Kaspersky Small Office Security INTRODUCING New for 2014!
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
Websms Offers Professional Messaging Solutions via Web, , Gateway or Directly Out of Excel (Online) on the Microsoft Office 365 Platform OFFICE 365.
Introduction to Office 365. Topics Covered What is Office 365? Office 365 Infrastructure Office 365 Components Outlook Web App & Logon Process Training.
Google Apps for Education Account Overview for Staff.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
IT Workshop Presented by CoM IT Thursday, November 20th 3:30 – 5:00 PM MSB ROOM 4051 Speakers: Jesse Fatherree, Wade Hedgren, Kent Norton We will be covering.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
OFFICE 365 APP BUILDER PROFILE: Druva
Office 365 Upsell Paths.
With Office 365, Collaborative Solution by Qorus Streamlines Document Assembly and Enhances Productivity for Any Business-Critical Documents OFFICE 365.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
DATA SECURITY FOR MEDICAL RESEARCH
File Management in the Cloud
WorkDiff Mobile, Scenario-Based Collaboration Solution WorkDiff Allows Users to Work Differently While Using Familiar Functions of Microsoft Office 365.
Office 365 is cloud-based productivity, hosted by Microsoft.
Using Apps to Get and Share Information
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
Smart Org Charts in Microsoft Office 365: Securely Create, Collaborate, Edit, and Share Org Charts in PowerPoint and Online with OrgWeaver Software OFFICE.
Encryption The Good kind of obscurity
Introduction to Soonr by ….
Cloud Storage Services
IT services Miki Kallio Liaison Manager (IT and Research), PhD
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Which is right for your business, Office 365 or Microsoft 365?
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
Google Apps for Education
Which is right for your business, Office 365 or Microsoft 365?
File Sharing Training – Drop box and office 365
Encryption in Office 365 Shobhit Sahay Technical Product Manager
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Yooba File Sync: A Microsoft Office 365 Add-In That Syncs Sales Content in SharePoint Online to Yooba’s Sales Performance Management Solution OFFICE 365.
IT Office hours – 1 Data Sharing 101
School of Medicine Orientation Information Security Training
Presentation transcript:

Secure Transit & Storage HOW TO SECURELY STORE & SEND CONFIDENTIAL DATA by The UTHSC Information Security Team

Current Challenges Certain data files require large amounts of storage ​ Having multiple copies and secure backups in the event data or file is lost or corrupted Securing files and data but also making those files easily accessible ​ Share and send confidential data securely

Confidential Data & Information Unique Identifiers Examples Name & Addresses Address and Phone/Fax Number SSNs Identifying Photography Account, certificate, and license numbers Vehicle identifiers and serial numbers, including license plate numbers Device identifiers and serial numbers URLs and IP Addresses Applies to ALL applicable Federal, State, Local laws and regulations related to safeguarding confidential data and information.

What To Do Protect confidential data or information. Recognizing the unique identifiers. Refrain from texting ​ confidential data/information. Use trusted and authorized systems to send and receive confidential data and information. There are a number of systems you do not want to use including Gmail, Yahoo, AOL, and other unauthorized systems. Keep confidential data contained. Try to refrain from forwarding s. ​

What’s the Potential Harm? Breaches of data security can result in Damage to reputation Disruption of operations Legal liability under new and amended laws, regulations, and guidelines, as well as under contracts Financial costs

SOLUTIONS!

Storage Hard Drive & Device Storage Computer (Desktop workstations) LaptopiPadTabletiPhoneAndroid Cloud Storage (or Virtual Storage) XythosOffice365

Transit Shared Drive or Secure File Sharing Xythos Office365 SharePoint Office365 Exchange NcryptedCloud Encrypted USB Encrypted Secure

Xythos Storage & Secure File Sharing Xythos is content management software that allows you to place files in a central location so they can be accessed via the internet. You can upload, access, and share files from anywhere with any computer that is connected to the internet. With a Xythos account you can share your files and folders with anyone at UTHSC or outside of the college. Xythos offers: An alternative secure way of sharing files without the use of attachments Ease of access from anywhere A browser-based, OS-Independent web interface Flexible, user defined shares to anyone on and off campus Secure file transfers

SharePoint Online (O365) Storage & Secure File Sharing Cloud-based collaboration; all the functionality of our existing SharePoint server plus more Cloud-based collaboration; all the functionality of our existing SharePoint server plus more Retirement of the on-premise SharePoint server will be considered after the Office 365 Education implementation. All existing SharePoint data will be retained. Rollout: Fall

Encrypted Cloud EnCrypted Cloud is an encryption and sharing mechanism. Protect and share your files in seconds from your existing cloud provider on any device. Track & control access to your files even after you’ve hit Send. Connect with current cloud drives like Dropbox, GoogleDrive, OneDrive, and Box. Contact the UTHSC Information Security Team if you or your department is interested in trying Encrypted Cloud.

Exchange (O365) Migration to cloud-based server (no changes to Outlook); increase in quota from 1GB to 25GB Encrypted Rollout: Fall

UT Courier Secure (UT Vault) Transmit confidential data and information with UT and non-UT personnel UT Users Max file size: 1.5GB Cumulative Storage: 10GB Number of messages allowed to be sent: 50/hr Number of messages a single address can receive: 50/hr Non-UT Users Max file size: 1.5GB Cumulative Storage: 3GB Number of messages allowed to be sent: 3/hr Number of messages a single address can receive: 2/hr

Computer and Laptops Full Disk Encryption (FDE) Trend Micro Minimizes impact in case of data theft and accidental data loss along with information security violations, reputation damage, and revenue loss. In the event a device is lost or stolen, full disk encryption ensures your data is unreadable. Rollout: Fall

iPads and Tablets Passcode Download and Install all Office365 Apps from Microsoft, Inc. using your UTHSC credentials (Rollout: Fiscal Year) Tablets (android devices) Native Encryption within settings

iPhones & Androids Passcode Download and Install all Office365 Apps from Microsoft, Inc. using your UTHSC credentials (Fall 2015) Tablets (android devices) Native Encryption within settings

Encrypted USB Encrypted and Authorized USB or Jumpdrives are suitable for transit of confidential data and information Individuals MUST take necessary precautions in safekeeping the USB

Summary Learn to recognize unique identifiers. NEVER text confidential data or information. Use ONLY secure and authorized systems to store and transfer confidential data and information. THINK before you send or store. If you are in doubt, contact Information Security.

UTHSC Information Security Team L. Kevin Watson (901) Frank Davison (901) Jessica McMorris (901) Ammar (901) Information Security Website: security.uthsc.edusecurity.uthsc.edu To report phishing and spam forward it to