Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect.

Slides:



Advertisements
Similar presentations
Internet Security What you can do to protect your family.
Advertisements

Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
The Identity Theft Protection Act of 2005 Kim D’Arruda Roy Cooper Attorney General.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Peeling Back the Layers of an Ogre (or for those who like boring titles – Where is Our Confidential Data Hiding?) Harvard Townsend IT Security Officer.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Steps to Compliance: Bring Your Own Device PRESENTED BY.
Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
PERSONAL INFORMATION SWEEP Juliana Luna-Freire, Graduate Assistant David Reamer, Graduate Assistant Justin LeBreck, Applications Systems Analyst.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Information Security Office 1 Copyright Statement Copyright Mary Ann Blair This work is the intellectual property of the author.
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
Chapter 5: System Software: Operating Systems and Utility Programs.
Information Security Information Technology and Computing Services Information Technology and Computing Services
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Desktop 1 Owning the Desktop: Is.edu like.com? Scott Bradner Harvard University University Technology Security Officer 28 June 2006.
Protecting Sensitive Information PA Turnpike Commission.
Medical Application Giant Squid Michal Cohen Robet Esho Chris Hogan Kate Kuleva Nisha Makwana Alex Rodrigues Rafal Urbanczyk.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
Accounting Electronic Records Management Process Your Company Name Here. Confidential. Revision # ___. Date: _____ By: _______________ 1 1. Full Access.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
 Identify problems that can occur if hardware is not properly maintained.  Identify routine maintenance that can be preformed by users.  Identify maintenance.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
Pembroke Pines Charter Middle School Central Campus Proudly Presents Technology Night 2013.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
FINANCIAL MANAGEMENT 29 AUG 05 OC CARUSO. OVERVIEW BUDGETS CREDIT CARDS IDENTITY THEFT IMPORTANT FINANCIAL TOPICS FOR NEW COLLEGE STUDENTS.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
DELETING TEMPORARY FILES 1.Click “Start” -> “Search” -> “All Files and Folder”. 2.In “All or Part of the file name” box enter “*.tmp” and click “Search”.
Internet Safety Internet Safety LPM
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
SCHOOLS FINANCE OFFICERS MEETINGS Records Management, “Paper-Lite” Environments and Procedures when a school closes Elizabeth Barber.
Keeping Computers Clean: Optimizing PC Performance.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Society & Computers PowerPoint
OMIS 682 HARKAMEL MANN.  A campus network, also known as a campus area network or CAN, is a computer network made up of a variety of local area networks.
Procedures Manual 1.Removing sensitive informationRemoving sensitive information.
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
IDENTITY FINDER TRAINING. What is Identity Finder?  Identity Finder is a program that is installed on your desktop, laptop, or server to locate personally.
Data Admin home page. New (unmatched) record Identity record.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Identity Finder Client
E&O Risk Management: Meeting the Challenge of Change
Cleaning Up Your Hard Drive Space
Taming the Wild Unstructured Data: The Shared Drive Jungle
Information Security Seminar
The Ultimate Backup Solution.
7 IM Habits for Highly Effective People
Complete Records Management in SharePoint.
HIPAA Overview.
Presentation transcript:

Attacking Sensitive Data on Your Computer

Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect ourselves, friends, and family.

Overview of SSN Policy Implementation Requirements Approval Process for SSN SSN Inventory & Remediation Plan SSN Remediation Plan

Know Your Data Make a flow chart of your data Daily Admissions H: Drive Advance/ BSR to Med Admin Suggestions SQL Server

What does Identity Finder do? Searches hard drives, , network shares, CDs, DVD’s, you name it for sensitive data like SSN. Provides a report of the interesting files. With a sneak peek. Allows for on-the-spot remediation. After remediating the report, do not keep the report.

Did someone demo time?

Lots and Lots of Matches Know your data Clean your temporary files Sort by number of matches Exclude/include certain file types

Clean Up Browsers Empty Recycle Bin Ccleaner Secure Deletion Shredder

Sort by Number of Matches Demo

Quarantine to Secure Server Move files to a secure server Nobody misses them notification of deletion

Records Management Go to Records Management Web Site Records can be destroyed by the Records Retention Schedules Produced by the Library of Virginia For more info, Caroline Walters

What does this mean at home? ure=PlayList&p=B40DCC4B0DD054DC&playnext=1&p laynext_from=PL&index=63 ure=PlayList&p=B40DCC4B0DD054DC&playnext=1&p laynext_from=PL&index=63 Identity Finder can be purchased for home use.

Questions What is your process? What are your issues?