attacking sensitive data on your computer. why? who cares? increasing data theft & data breaches...
DESCRIPTION
Overview of SSN Policy Implementation Requirements Approval Process for SSN SSN Inventory & Remediation Plan SSN Remediation PlanTRANSCRIPT
![Page 1: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect](https://reader036.vdocuments.us/reader036/viewer/2022082510/5a4d1b187f8b9ab059992720/html5/thumbnails/1.jpg)
Identity FinderAttacking Sensitive Data on Your Computer
![Page 2: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect](https://reader036.vdocuments.us/reader036/viewer/2022082510/5a4d1b187f8b9ab059992720/html5/thumbnails/2.jpg)
Why? Who cares?Increasing data theft & data breaches = $$$$
$Where does the money go?Comply with lawsProtect ourselves, friends, and family.
![Page 3: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect](https://reader036.vdocuments.us/reader036/viewer/2022082510/5a4d1b187f8b9ab059992720/html5/thumbnails/3.jpg)
Overview of SSN Policy Implementation RequirementsApproval Process for SSNSSN Inventory & Remediation Plan
SSN Remediation Plan
![Page 4: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect](https://reader036.vdocuments.us/reader036/viewer/2022082510/5a4d1b187f8b9ab059992720/html5/thumbnails/4.jpg)
Know Your DataMake a flow chart of your data
Daily Admissions
H: Drive
Advance/BSR
Email to Med Admin
Suggestions
SQL Server
![Page 5: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect](https://reader036.vdocuments.us/reader036/viewer/2022082510/5a4d1b187f8b9ab059992720/html5/thumbnails/5.jpg)
What does Identity Finder do?Searches hard drives, email, network shares,
CDs, DVD’s, you name it for sensitive data like SSN.
Provides a report of the interesting files.With a sneak peek.Allows for on-the-spot remediation.After remediating the report, do not keep the
report.
![Page 6: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect](https://reader036.vdocuments.us/reader036/viewer/2022082510/5a4d1b187f8b9ab059992720/html5/thumbnails/6.jpg)
Did someone demo time?
![Page 7: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect](https://reader036.vdocuments.us/reader036/viewer/2022082510/5a4d1b187f8b9ab059992720/html5/thumbnails/7.jpg)
Lots and Lots of MatchesKnow your dataClean your temporary filesSort by number of matchesExclude/include certain file types
![Page 8: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect](https://reader036.vdocuments.us/reader036/viewer/2022082510/5a4d1b187f8b9ab059992720/html5/thumbnails/8.jpg)
Clean UpBrowsersEmpty Recycle BinCcleaner Secure Deletion Shredder
![Page 9: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect](https://reader036.vdocuments.us/reader036/viewer/2022082510/5a4d1b187f8b9ab059992720/html5/thumbnails/9.jpg)
Sort by Number of MatchesDemo
![Page 10: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect](https://reader036.vdocuments.us/reader036/viewer/2022082510/5a4d1b187f8b9ab059992720/html5/thumbnails/10.jpg)
Quarantine to Secure ServerMove files to a secure serverNobody misses themEmail notification of deletion
![Page 11: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect](https://reader036.vdocuments.us/reader036/viewer/2022082510/5a4d1b187f8b9ab059992720/html5/thumbnails/11.jpg)
Records ManagementGo to Records Management Web SiteRecords can be destroyed by the Records
Retention SchedulesProduced by the Library of VirginiaFor more info, email Caroline Walters
![Page 12: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect](https://reader036.vdocuments.us/reader036/viewer/2022082510/5a4d1b187f8b9ab059992720/html5/thumbnails/12.jpg)
What does this mean at home?
http://www.youtube.com/watch?v=YvX4Jrh2uUc&feature=PlayList&p=B40DCC4B0DD054DC&playnext=1&playnext_from=PL&index=63
Identity Finder can be purchased for home use.
![Page 13: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect](https://reader036.vdocuments.us/reader036/viewer/2022082510/5a4d1b187f8b9ab059992720/html5/thumbnails/13.jpg)
QuestionsWhat is your process?What are your issues?