What is the best way to protect sensitive data?
Protecting Sensitive InformationUniversity colleges and departments that collect and store sensitive information on computer systems including such data as Social Security Numbers, driver’s license information and individual financial information (such as credit card numbers, bank account numbers, or financial statements), should have the following security controls in place to maintain data integrity and confidentiality. WSU must assure the security and protection of Sensitive Information in the University’s custody, whether in electronic, paper, or other forms. Show For more information on what is sensitive information, please visit our Sensitive Information page.
The following are also required to protect sensitive information: Laptops and Workstations: Sensitive information should never be stored on computer laptops and other portable computer devices unless strong data encryption is employed. Sensitive information may be stored on local workstations, but each workstation must have the following security controls:
Transmission: Confidential, Restricted or High-Riskinformation should never be transmitted by e-mail or through insecure file transfer methods (such as FTP). Appropriate Handling of Requests for Information: Requests from third parties for sensitive information must be referred to individuals who are authorized to handle these types of requests and trained in safeguarding sensitive information. Historical records containing Social Security Numbers in offline storage — such as paper, tape, cartridge, fiche, microfilm or magnetic media — may be maintained as long as it is physically secured and access to these off-line records is limited to authorized individuals. Report Breachs: All computer security breaches or systems with sensitive information discovered to be lacking these recommended security controls must be immediately reported to the College or Division Data Security Steward or the University’s IT Service Desk 626-7777. What is sensitive data and how is it protected?Sensitive data is confidential information that must be kept safe and out of reach from all outsiders unless they have permission to access it. Access to sensitive data should be limited through sufficient data security and information security practices designed to prevent data leaks and data breaches.
How will you protect the sensitive data in the databases?Let's look at 10 database security best practices that can help you to bolster your sensitive data's safety.. Deploy physical database security. ... . Separate database servers. ... . Set up an HTTPS proxy server. ... . Avoid using default network ports. ... . Use real-time database monitoring. ... . Use database and web application firewalls.. What is the best method to secure data in use?The best way to secure data in use is to restrict access by user role, limiting system access to only those who need it. Even better would be to get more granular and restrict access to the data itself.
What are the three ways to protect data?45105872_technology-security-access-and-data-privacy.jpg. Encrypt your data. ... . Backup your data. ... . Make your old computers' hard drives unreadable. ... . Secure your wireless network at your home or business. ... . Use a firewall. ... . Encrypt data on your USB drives and SIM cards. ... . Disable file and media sharing if you don't need it.. |