MCCC Knowledge Base

Protecting Sensitive Data

2015

Protecting Sensitive Data

 

The information age has created an explosion of information and an abundance of access to it. If you are doing personal business or acting on behalf of the college, you are likely handling sensitive information on a regular basis. Cyber criminals have created an industry to target that information and monetize it for quick financial gain. The risks to us as individuals and as institution have never been greater. Fortunately, there are some simple steps that we can take to protect ourselves and the students that we serve.

What data is sensitive?

There are a number of factors that impact the sensitivity of data. Typically, the sensitivity of data is directly proportional to the amount of harm that can come if that data is exposed to unauthorized individuals. That harm can come in the form of identity theft, financial loss, reputational loss, invasion of privacy, etc.

Social Security Number, credit card number, bank accounts, driver’s license, health information, student information and computer passwords are examples of highly sensitive data types that can cause significant harm if improperly handled or exposed.

For more information about data sensitivity and classifications, please review the College Data Classification IT Security Compliance Standard.

How do I protect it?

First, you need to find the sensitive information, then determine if you need to keep it. If you don’t need it, then you need to securely dispose of it. If you need to keep it, then you need to protect it.

Find It!

The first step to protecting sensitive information, is to determine where it is. Sensitive data can be stored on computer hard drives, mobile devices, thumb drives, and cloud storage areas which can easily be searched, but may also be found in harder to search locations like web browser caches.

The college licenses a tool named Identity Finder that can scan your computer for sensitive data, and then helps you to remove or secure them. This tool is accessible on college computers and free for Montgomery County Community College students to use on their personal devices.

Also, check your paper files for sensitive data.

Delete It! (if you don’t need it)

Once you have found sensitive data, the first question you need to ask is “Do I need this?”. If the answer is no, then you need to securely remove the data. If in paper form, use a cross-cut shredder to protect against a lucrative form of trash picking known as dumpster diving.

If in electronic form, use a secure deletion utility. Moving the document to the operating system trash or recycling bin is NOT sufficient.  Identify Finder has an option to securely delete, and you can consider one of the following tools.

These tools are designed to irretrievably erase data, so use caution when utilizing these tools.

Protect It!

Once you determine that you have sensitive information that you need to keep, you should store it safely.

For paper documents, lock them in a drawer or filing cabinet. DO NOT leave them out on your desk.

When printing, use the secure print function that allows you to send documents to the printer that will not print until you go to the printer and enter a PIN.

For electronic data, ENCRYPT…ENCRYPT….ENCRYPT. There are numerous device types and methods for encryption that we can’t concisely cover here. We’ll cover a few, but please reach out to the IT helpdesk if you have a question about how to encrypt data on your device.

****SPECIAL NOTE****Like the lock to your car or home, digital encryption relies on a key. Without the key you can’t get in or access the data. In many instances this key is implemented in the form of a password and the strength of the protection relies significantly on the strength of the password. Use strong and unique passwords for encryption. Consider referring to our password best practices for additional guidance.

            File Encryption

                Protecting Microsoft Office Documents —

Word - https://support.office.com/en-ie/article/Password-protect-a-document-8f4afc43-62f9-4a3a-bbe1-45477d99fa

Excel - https://support.office.com/en-us/article/Password-protect-a-workbook-7e365a4d-3e89-4616-84ca-1931257c1517

GNU Privacy Guard - https://www.gnupg.org/ (Windows, OS X, Linux)

VeraCrypt - https://veracrypt.codeplex.com/ (Windows, OS X, Linux)

7-Zip - http://www.7-zip.org/ (Windows, OS X, Linux)

            Hard Drive Encryption

       BitLocker - http://windows.microsoft.com/en-us/windows/protect-files-bitlocker-drive-encryption#1TC=windows-8 (Windows)

FileVault - http://support.apple.com/en-us/HT4790 (OS X)

Android - https://kb.mc3.edu/article.php?id=295

iOS - https://kb.mc3.edu/article.php?id=298

                               

                               

 

 

0 (0)
Article Rating (No Votes)
Rate this article
Attached Files
There are no attachments for this article.
Comments
There are no comments for this article. Be the first to post a comment.
Name
Email
Related Articles RSS Feed
Creating a Rule for Secure File Transfer (SFT) Notifications
Viewed 986 times since Wed, May 24, 2017
Sending an encrypted email to an external email address
Viewed 5806 times since Thu, Mar 12, 2015
MC3 Two-Factor Authentication Duo Security
Viewed 3648 times since Mon, Nov 24, 2014
LastPass - Password Manager - PC
Viewed 3110 times since Thu, Nov 12, 2015
Adding Trusted Sites (Windows 10)
Viewed 20353 times since Mon, Nov 21, 2016
Unblock a File (Windows 10)
Viewed 1966 times since Mon, Nov 21, 2016
Setting up iPhone/iPad for Auto Screen Lock
Viewed 2240 times since Wed, Oct 15, 2014
Secured Print
Viewed 4158 times since Thu, Mar 12, 2015
What is a reputable and updated operating system?
Viewed 2253 times since Mon, Jul 18, 2016
Software Updates on College Owned Windows Computers
Viewed 1816 times since Wed, Jul 8, 2015

Need Help?