Solved

How can I find sensitive personal information stored in computer files

Posted on 2014-09-23
7
1,128 Views
Last Modified: 2014-09-24
Hi & thank you in advance,

Is there a software scanner that I can use to scan computers for sensitive information (social security numbers, credit card numbers, family information) stored in text, word, excel etc data files.  I looked into DLP but the company cannot afford to purchase.

I am open to suggestions.
0
Comment
Question by:cesemj
7 Comments
 
LVL 24

Assisted Solution

by:Phillip Burton
Phillip Burton earned 100 total points
ID: 40338578
You could use X1 Search 8 to look inside files - http://www.x1.com/products/x1_search/

If you want a catalog of your hard drive in Excel, with document properties, then you could use Filecats Professional - http://www.filecats.co.uk
0
 
LVL 61

Accepted Solution

by:
btan earned 250 total points
ID: 40339030
You may be interested in this
https://cuit.columbia.edu/cuit/it-security-resources/handling-personally-identifying-information/pii-scanning-software

CUSpider scans a computer for Social Security Numbers, produces a list of files, and provides options for you to take immediate actions for remediation.

Spider can be used to scan a computer for Social Security Numbers and other sensitive information. Spider produces a list of files which appear to contain this information, and provides options for you to take immediate actions for remediation.

OpenDLP is another open-source alternative, though more strongly geared towards a centrally managed, server-client envrionment. It can push out scans over network shares and to any Windows Domain connected computer, even without a pre-installed client agent.

Identity finder is an enterprise level PII scanning application and DLP manager.
0
 

Author Comment

by:cesemj
ID: 40339183
Thank you both, I will send an update this evening.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 61

Expert Comment

by:btan
ID: 40339416
kindly do note the usage and license where applicable from the source in the use case.

Also there is another software program that allows users to quickly scan their computers for sensitive numbers. But this tool does not guarantee your computer is free of social security and credit card numbers. It simply reports files that contain numbers which look like they could pose a security threat.
http://www.utexas.edu/its/products/senf/
0
 
LVL 1

Assisted Solution

by:Travis Martinez
Travis Martinez earned 100 total points
ID: 40340771
Personally...  Forensic analysis tools are what I've leveraged for this type of scan.  Each silo/vendor has a specific niche.  Some have to have physical possession and the scans are intrusive.  Others, will reach out across the network and do it under the radar and quiet.

Here's a list of document tools:

http://www.forensicswiki.org/wiki/Tools:Document_Metadata_Extraction

Here's one specific to files and network access and fairly reasonable considering the offering:

http://www.fid3.com/fi-file-find-features

Sourceforge has Autopsy and a few others.  Sounds like you'll want something with a bit more meat to it and for $300 the FI File Find is a decent value.

Thanks,

Safety First!
0
 

Author Comment

by:cesemj
ID: 40342268
Thank you all again, I am looking at the products and will update his evening.
0
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 50 total points
ID: 40343077
OpenDLP can do a good job, it's not the very best, but for free it's awesome: https://code.google.com/p/opendlp/
-rich
0

Featured Post

How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

Join & Write a Comment

Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now