File and Folder
Text Encryption
PGP/GPG
Conduct a benchmark assessment of current practices
Get executive leadership to form a stakeholder committee
Develop Policies and Procedures for Safeguarding Sensitive Data
Review paper processes
Review digital processes
Compare them to what other's do
Develop incident response team
Provide professional learning
This is a question you will get. Make sure you keep your response simple and make it a requirement of dealing with sensitive data.
Avoid embarrassment and high-cost of identity theft protection for students and staff. Texas Safe Harbor law protects organization that encrypt data should that data be lost or stolen.
Avoid sending decrypted confidential information via email or as email attachments. Phishing attacks can compromise users' accounts and spread to all quickly via email groups (a.k.a. distribution lists). Decrypted data on compromised accounts can be a treasure trove and lead to costly issues. Encrypted email attachments are no big deal on a stolen smartphone, tablet or laptop. Decrypted email attachments or files on stolen devices puts the district at risk for liability and lawsuits.
Avoid saving decrypted files to portable devices (e.g. laptops, tablets) and/or storage media (e.g. USB flash drives, pendrives, sticks, hard drives).
Always encrypt sensitive data before sending it to a third party solution provider. Negotiate up front, over the phone how you will encrypt data and come up with a solid password to use. If data is transferred from a server, encrypt it FIRST before placing it on the server, then use Secure FTP to transfer it. An alternate approach is to grant the 3rd party solution provider Virtual Private Network (VPN) access to a specific device. This may be easier since you can setup a network share, a mapped drive, to make it simpler to create and share files quickly. Again, it is better to encrypt than to have decrypted files at rest on an intranet server.
NEVER place decrypted sensitive files online on an internet server and/or in cloud storage.
This is a question you will get. Make sure you keep your response simple and make it a requirement of dealing with sensitive data.
Avoid embarrassment and high-cost of identity theft protection for students and staff. Texas Safe Harbor law protects organization that encrypt data should that data be lost or stolen.
Avoid sending decrypted confidential information via email or as email attachments. Phishing attacks can compromise users' accounts and spread to all quickly via email groups (a.k.a. distribution lists). Decrypted data on compromised accounts can be a treasure trove and lead to costly issues. Encrypted email attachments are no big deal on a stolen smartphone, tablet or laptop. Decrypted email attachments or files on stolen devices puts the district at risk for liability and lawsuits.
Avoid saving decrypted files to portable devices (e.g. laptops, tablets) and/or storage media (e.g. USB flash drives, pendrives, sticks, hard drives).
Always encrypt sensitive data before sending it to a third party solution provider. Negotiate up front, over the phone how you will encrypt data and come up with a solid password to use. If data is transferred from a server, encrypt it FIRST before placing it on the server, then use Secure FTP to transfer it. An alternate approach is to grant the 3rd party solution provider Virtual Private Network (VPN) access to a specific device. This may be easier since you can setup a network share, a mapped drive, to make it simpler to create and share files quickly. Again, it is better to encrypt than to have decrypted files at rest on an intranet server.
NEVER place decrypted sensitive files online on an internet server and/or in cloud storage.
iOS | Android | Windows | Mac | Web version
To facilitate decryption, open the Paranoia Text Encryption Online tool (via the web browser on your device, including smartphones) and paste in the text that appears below. Use the password - kQgWbQhc58wc - and send it to "mguhlin@tcea.org" via email. Obviously, this password would not be shared on a web page for anyone to access. It is shared here for demonstration purposes.
==Begin Encrypted Text Below (only copy encrypted content, not anything with == in front of it)
fIqoBFlGIJibGhbYnHhdKkrpjQs2a]DKvDuxGOIEosjfgk)bHvqKB693PuPdSGCbtT9rS]KB3PFNo0MVKm95B)yF06rj)]KrLJnPfpogU1yIT]DgCzbsw8PlqxSZ]ndqcefwocfLOX9)q3tDSWtNg9WPw85yMyI47H6t8y1)LESw3P3roKKx3)3QscDPifOOTPhwOzmMkvl5ZgzvkzIbX8gQrcXrXJR2O9r5axA63]L6Ja9L6UeVt1Q810oZlDkLD2RIu0RS6ilV8aIR)TIrs66MxYYOqgh2HQ1UgSuI33EMuV8jGENDYxjxGA)5K]g6YJekzBGr5iWGYymUTP)UQvRIU2TSfmkIYzpAIozEMcBsrZ9KBzfchP1LdkB7oOH6ZSnFIrDskFwgx31AjCGeOEjy8bhkvF9gx2UkCDr28rMfR6DIPUGX7vjZY5fuDR])blioTUqE1I66ltMkJ9lMHTjntNQhu1rED232iV727yBPuNHJWu1qfNDgQLNsxngWIuxu7Y2Wt3jH1ql3IpePG3w1sjicGwmfzsj]1lW)1MoXzkFuLI8fC5556Q8FSG6R44XS)Sy5z5Xq412u6XPPU4M3HanQrIb1SGGTcjf1QDStWTREzQQKeT9G5blz499O8YxWqq9Q4Q1poQYFqDXYBPZjV9i93AiP9W4JStyShTU)ezjqBWpQmEy4UVCPD7yR]QLBcSUZT7OshQ)Ow6lxZm)lU6A!
==End Encrypted Text Below (only copy encrypted content above)
To encrypt text, type your own message in the Paranoia Text Encryption Online tool and then send the encrypted text to "mguhlin@tcea.org" with subject line of "Encrypted Text." Use the password - T5ecaJiMepSU - to encrypt. Or, if you prefer, use a different password.
7zip for Windows - This is a zip/7zip compression program that combines multiple files into one. Works great with a wide variety of files. Think of it as putting a folder of files into ONE file that is compressed for space and encrypted for security.
Keka Zip for Macs - This is the same thing as 7zip but for Mac computers.
Paranoia's Secure Space Encryptor (SSE) - Here is (what I think) is the best cross-platform encryption tool available. It works on the most platforms (e.g. Android, Mac, Windows). One of the features is that it can take a folder of files and encrypt them all into ONE file.
FileLock.org - A browser-based solution that works well for Chromebooks. Encrypt individual files via your web browser.
Get Secure Space Encryption (SSE) tool, 7zip (Windows) or Keka (Mac). Set it up on your computer.
Find a file or folder (avoid folders with hundreds of files for this activity...a folder with 2-5 files is sufficient).
Encrypt the file/folder with your preferred tool using AES-256 encryption protocol. Use this password: M9pXYbENF5mp
Send the file as an attachment to Miguel at "mguhlin@tcea.org" with Subject: Encrypted File
Save the file available online and decrypt it. A copy of the encrypted file is available in ZIP (*.zip) or SSE (*.enc) encrypted format.
Open the files successfully on your device.
Make sure to shred/wipe the ORIGINAL decrypted files/folder(s) when "at rest." Of course, first check that your decryption password works.
Dragging items to the Trash/Recycle Bin is insufficient since they can be recovered using a free tool like Recuva or Kickass Undelete on Windows or your hard drive accessed on a GNU/Linux system then files recovered.
File Shredder (Windows)
Bleachbit (Windows/GNU-Linux)
You can easily encrypt emails in Google Suites or Outlook using one of these tools. Remember that you can also use ProtonMail or Tutanota encrypted email providers for personal use.
Virtru Email Encryption - Encrypt email messages you send to anyone (e.g. Gmail, Yahoo, etc.) (Watch video)
Mailvelope - Another way to encrypt email using public/private key encryption (Watch video)
Paranoia Text Encryptor (PTE) - Call someone, give them the password then email the encrypted text (Watch video)
Gpg4win is the official GnuPG distribution for Windows and provides the high cryptographic standards of the GNU Privacy Guard. GnuPG follows the recommendations regarding algorithms and key length of the German Federal Office for Information Security (BSI).
To create OpenPGP and X.509 certificates Gpg4win uses a key length of 2048bit by default. The default algorithm for signing and encrypting is RSA.
Sign single files or complete folders directly from the Windows Explorer with GpgEX or Kleopatra. You can select multiple files and folders to sign and encrypt them recursively into a gpgtar archive.
The provided Outlook plugin GpgOL allows to sign and encrypt emails directly in Microsoft Outlook. Attachments can be encrypted as well, in one go with the email body. Verifying signatures and decrypting messages is done directly in Outlook too.
A step-by-step installation guide is provided as part of the Gpg4win Compendium.
Open PGP (free), also known as GPG, is a popular encryption standard that protects the privacy and integrity of sensitive files. Open PGP implements asymmetric (public key) cryptography to provide strong security and repudiation of files. GoAnywhere MFT provides robust support for PGP, allowing you to:
Encrypt files with one or more Public Keys
Decrypt files with Private Keys
Sign files with Private Keys
Verify digital signatures in files using Public Keys
Generate full audit logs of all PGP encryption and decryption processes
Open PGP software is used by banks, financial institutions, healthcare organizations and other highly regulated industries to protect their most sensitive files. (Source)
Veracrypt has fixed problems identified via an audit of its predescessor, TrueCrypt. This makes it MORE secure and an excellent solution.
"VeraCrypt supports two types of plausible deniability–the existence of encrypted data is deniable because an adversary cannot prove that unencrypted data even exists. Hidden volumes reside in the free space of visible container volumes–space which would otherwise be filled with random values if the hidden volume did not exist. Hidden operating systems exist alongside visible operating systems. If an adversary forces you to hand over a password, you can just give them the password for the visible OS" (Source: Five Best Disk Encryption Solutions).
You can build the program from the source code for Mac and GNU/Linux, but you can save yourself some headaches and skip that. Best to use a solution like VeraCrypt that's well-supported and cross-platform with OS specific setup programs.
That's why I have two separate folders on my hard drives. One is encrypted and has top secret files that I wouldn't want to get out (e.g. medical, personnel, financials). The other is encryption free and where I store family photo albums, public work files, and more.
You can see in the image (left) that file/folder level encryption allows you to encrypt individual files or folders, but your operating system works without encryption.
Full-disk, or whole-disk, encryption, involves putting your whole hard drive, including the operating system, into a lock box. While this is desirable in some situations (e.g. you're a spy), it can cause a serious performance hit. And, if there is a hard drive failure of any sort, you lose all your data.
Which solution works best for you?
The main benefit of these two solutions, neither of which is open source, is that they come with your device. That said, I don't recommend either.
Bitlocker is a Windows specific solution that offers whole disk encryption. Some organizations use it, but due to the performance hit, many avoid it. Instead they rely on encrypted data containers (e.g. VeraCrypt) or file/folder encryption with AES-256.
FileVault is Apple Mac specific.
“John,” began Liz, the PEIMS Data Clerk at the high school. Tears started to stream down her face. “I saved some work out of iTCCS to take home and analyze last night onto my USB drive. This morning, when I went to pick up my coffee from Starbucks, I think it fell out of my purse while I was paying. I can’t find it and I’ve looked everywhere.”
Liz paused then said, “I had the entire freshman class’ data on an encrypted file. What do I do?”
"Melodie," said her superintendent. "Turn on the news." It was 5:30pm and Melodie was just getting home from an after-school event.
As she watched the news broadcast play on the television, her heart dropped into her stomach. "What do we do, Jim?" she asked her super.
"Let's plan to meet tomorrow morning after Cabinet to discuss what our next steps are. While I am meeting with Cabinet, take a moment to discuss this with Charles (the tech director). Come up with our next steps and we'll figure this out."
“I just need a quick print-out so I have something I can reference in my hand,” Jill exclaimed. As Darlene printed out the report from iTCCS, she promised to put the document in Dropbox so Jill could get to it more easily. Jill dropped the sheaf of papers into her briefcase and ran out the door.
“Maybe,” she thought to herself, “I’ll have time to stop at HEB on the way home tonight, get a good night’s sleep so I’ll be fresh for this data presentation tomorrow morning.” She looked at her briefcase, carefully locking it in the trunk and casually throwing a blanket on top of it, just in case.