Presentation is loading. Please wait.

Presentation is loading. Please wait.

Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect.

Similar presentations


Presentation on theme: "Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect."— Presentation transcript:

1 Attacking Sensitive Data on Your Computer

2 Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect ourselves, friends, and family.

3 Overview of SSN Policy Implementation Requirements Approval Process for SSN SSN Inventory & Remediation Plan SSN Remediation Plan

4 Know Your Data Make a flow chart of your data Daily Admissions H: Drive Advance/ BSR Email to Med Admin Suggestions SQL Server

5 What does Identity Finder do? Searches hard drives, email, network shares, CDs, DVD’s, you name it for sensitive data like SSN. Provides a report of the interesting files. With a sneak peek. Allows for on-the-spot remediation. After remediating the report, do not keep the report.

6 Did someone demo time?

7 Lots and Lots of Matches Know your data Clean your temporary files Sort by number of matches Exclude/include certain file types

8 Clean Up Browsers Empty Recycle Bin Ccleaner Secure Deletion Shredder

9 Sort by Number of Matches Demo

10 Quarantine to Secure Server Move files to a secure server Nobody misses them Email notification of deletion

11 Records Management Go to Records Management Web Site Records can be destroyed by the Records Retention Schedules Produced by the Library of Virginia For more info, email Caroline Walters

12 What does this mean at home? http://www.youtube.com/watch?v=YvX4Jrh2uUc&feat ure=PlayList&p=B40DCC4B0DD054DC&playnext=1&p laynext_from=PL&index=63 http://www.youtube.com/watch?v=YvX4Jrh2uUc&feat ure=PlayList&p=B40DCC4B0DD054DC&playnext=1&p laynext_from=PL&index=63 Identity Finder can be purchased for home use.

13 Questions What is your process? What are your issues?


Download ppt "Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect."

Similar presentations


Ads by Google