Download presentation
Presentation is loading. Please wait.
Published byWinifred Collins Modified over 9 years ago
1
Attacking Sensitive Data on Your Computer
2
Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect ourselves, friends, and family.
3
Overview of SSN Policy Implementation Requirements Approval Process for SSN SSN Inventory & Remediation Plan SSN Remediation Plan
4
Know Your Data Make a flow chart of your data Daily Admissions H: Drive Advance/ BSR Email to Med Admin Suggestions SQL Server
5
What does Identity Finder do? Searches hard drives, email, network shares, CDs, DVD’s, you name it for sensitive data like SSN. Provides a report of the interesting files. With a sneak peek. Allows for on-the-spot remediation. After remediating the report, do not keep the report.
6
Did someone demo time?
7
Lots and Lots of Matches Know your data Clean your temporary files Sort by number of matches Exclude/include certain file types
8
Clean Up Browsers Empty Recycle Bin Ccleaner Secure Deletion Shredder
9
Sort by Number of Matches Demo
10
Quarantine to Secure Server Move files to a secure server Nobody misses them Email notification of deletion
11
Records Management Go to Records Management Web Site Records can be destroyed by the Records Retention Schedules Produced by the Library of Virginia For more info, email Caroline Walters
12
What does this mean at home? http://www.youtube.com/watch?v=YvX4Jrh2uUc&feat ure=PlayList&p=B40DCC4B0DD054DC&playnext=1&p laynext_from=PL&index=63 http://www.youtube.com/watch?v=YvX4Jrh2uUc&feat ure=PlayList&p=B40DCC4B0DD054DC&playnext=1&p laynext_from=PL&index=63 Identity Finder can be purchased for home use.
13
Questions What is your process? What are your issues?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.