Solved

How can I find sensitive personal information stored in computer files

Posted on 2014-09-23
7
1,162 Views
Last Modified: 2014-09-24
Hi & thank you in advance,

Is there a software scanner that I can use to scan computers for sensitive information (social security numbers, credit card numbers, family information) stored in text, word, excel etc data files.  I looked into DLP but the company cannot afford to purchase.

I am open to suggestions.
0
Comment
Question by:cesemj
7 Comments
 
LVL 24

Assisted Solution

by:Phillip Burton
Phillip Burton earned 100 total points
ID: 40338578
You could use X1 Search 8 to look inside files - http://www.x1.com/products/x1_search/

If you want a catalog of your hard drive in Excel, with document properties, then you could use Filecats Professional - http://www.filecats.co.uk
0
 
LVL 62

Accepted Solution

by:
btan earned 250 total points
ID: 40339030
You may be interested in this
https://cuit.columbia.edu/cuit/it-security-resources/handling-personally-identifying-information/pii-scanning-software

CUSpider scans a computer for Social Security Numbers, produces a list of files, and provides options for you to take immediate actions for remediation.

Spider can be used to scan a computer for Social Security Numbers and other sensitive information. Spider produces a list of files which appear to contain this information, and provides options for you to take immediate actions for remediation.

OpenDLP is another open-source alternative, though more strongly geared towards a centrally managed, server-client envrionment. It can push out scans over network shares and to any Windows Domain connected computer, even without a pre-installed client agent.

Identity finder is an enterprise level PII scanning application and DLP manager.
0
 

Author Comment

by:cesemj
ID: 40339183
Thank you both, I will send an update this evening.
0
Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

 
LVL 62

Expert Comment

by:btan
ID: 40339416
kindly do note the usage and license where applicable from the source in the use case.

Also there is another software program that allows users to quickly scan their computers for sensitive numbers. But this tool does not guarantee your computer is free of social security and credit card numbers. It simply reports files that contain numbers which look like they could pose a security threat.
http://www.utexas.edu/its/products/senf/
0
 
LVL 1

Assisted Solution

by:Travis Martinez
Travis Martinez earned 100 total points
ID: 40340771
Personally...  Forensic analysis tools are what I've leveraged for this type of scan.  Each silo/vendor has a specific niche.  Some have to have physical possession and the scans are intrusive.  Others, will reach out across the network and do it under the radar and quiet.

Here's a list of document tools:

http://www.forensicswiki.org/wiki/Tools:Document_Metadata_Extraction

Here's one specific to files and network access and fairly reasonable considering the offering:

http://www.fid3.com/fi-file-find-features

Sourceforge has Autopsy and a few others.  Sounds like you'll want something with a bit more meat to it and for $300 the FI File Find is a decent value.

Thanks,

Safety First!
0
 

Author Comment

by:cesemj
ID: 40342268
Thank you all again, I am looking at the products and will update his evening.
0
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 50 total points
ID: 40343077
OpenDLP can do a good job, it's not the very best, but for free it's awesome: https://code.google.com/p/opendlp/
-rich
0

Featured Post

Save on storage to protect fatherhood memories

You're the dad who has everything. This Father's Day, make sure your family memories are protected. My Passport Ultra has automatic backup and password protection to keep your cherished photos and videos safe. With up to 3TB, you have plenty of room to hold the adventures ahead.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
How important is it to take extra precautions to protect your online business? These are some steps you can take to make sure you're free of any cyber crime.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

896 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now