SNS Hunts Down Sensitive Data

That sensitive data resides on less-than-secure systems is a fact of university life. Over the last few years, there have been dozens of incidents in which stolen, lost, or hacked computers, hard drives, or removable storage devices resulted in more than 4.9 million reported users--students, faculty, staff, patients--having their personal or financial information exposed. And there isn't a lot IT staffs can do about it when they don't know which systems contain such sensitive data.

(For numerous examples of breaches on and off campus, including the types of breaches and the numbers of users impacted, see the Privacy Rights Clearinghouse's "Chronology of Data Breaches.")

"What you don’t know can hurt you. That is especially true within the campus environment," said Dan Toughey, president of TouchNet Information Systems, in a statement released during last week's Educause conference. "Institutions of higher education can do all the right things in preparing for PCI compliance and still be highly vulnerable to the loss of sensitive, personal information."

The company recently launched a new solution for finding sensitive information that IT administrators might not know exists on their systems. Called Seek-N-Secure, the solution is a combination of service and software designed to track down unprotected and hidden data, especially personally identifiable information, and protect that information. It's also designed to allow IT staffs to develop compliance strategies by identifying business practices that contribute to the accumulation of such data, according to the company.

Seek-N-Secure was introduced last week. More information can be fond at the link below.

Read More:

About the Author

David Nagel is the former editorial director of 1105 Media's Education Group and editor-in-chief of THE Journal, STEAM Universe, and Spaces4Learning. A 30-year publishing veteran, Nagel has led or contributed to dozens of technology, art, marketing, media, and business publications.

He can be reached at [email protected]. You can also connect with him on LinkedIn at https://www.linkedin.com/in/davidrnagel/ .


Featured

  • hand touching glowing connected dots

    Registration Now Open for Tech Tactics in Education: Thriving in the Age of AI

    Tech Tactics in Education has officially opened registration for its May 7 virtual conference on "Thriving in the Age of AI." The annual event, brought to you by the producers of Campus Technology and THE Journal, offers hands-on learning and interactive discussions on the most critical technology issues and practices across K–12 and higher education.

  • cloud and circuit patterns with AI stamp

    Cloud Management Startup Launches Infrastructure Intelligence Tool

    A new AI-powered infrastructure intelligence tool from cloud management startup env0 aims to turn the fog of sprawling, enterprise-scale deployments into crisp, queryable insight, minus the spreadsheets, scripts, and late-night Slack threads.

  • laptop and fish hook

    Security Firm Identifies Generative AI 'Vishing' Attack

    A new report from Ontinue's Cyber Defense Center has identified a complex, multi-stage cyber attack that leveraged social engineering, remote access tools, and signed binaries to infiltrate and persist within a target network.

  • illustration of a football stadium with helmet on the left and laptop with ed tech icons on the right

    The 2025 NFL Draft and Ed Tech Selection: A Strategic Parallel

    In the fast-evolving landscape of collegiate football, the NFL, and higher education, one might not immediately draw connections between the 2025 NFL Draft and the selection of proper educational technology for a college campus. However, upon closer examination, both processes share striking similarities: a rigorous assessment of needs, long-term strategic impact, talent or tool evaluation, financial considerations, and adaptability to a dynamic future.