Solved

How can I find sensitive personal information stored in computer files

Posted on 2014-09-23
7
1,197 Views
Last Modified: 2014-09-24
Hi & thank you in advance,

Is there a software scanner that I can use to scan computers for sensitive information (social security numbers, credit card numbers, family information) stored in text, word, excel etc data files.  I looked into DLP but the company cannot afford to purchase.

I am open to suggestions.
0
Comment
Question by:cesemj
7 Comments
 
LVL 24

Assisted Solution

by:Phillip Burton
Phillip Burton earned 100 total points
ID: 40338578
You could use X1 Search 8 to look inside files - http://www.x1.com/products/x1_search/

If you want a catalog of your hard drive in Excel, with document properties, then you could use Filecats Professional - http://www.filecats.co.uk
0
 
LVL 63

Accepted Solution

by:
btan earned 250 total points
ID: 40339030
You may be interested in this
https://cuit.columbia.edu/cuit/it-security-resources/handling-personally-identifying-information/pii-scanning-software

CUSpider scans a computer for Social Security Numbers, produces a list of files, and provides options for you to take immediate actions for remediation.

Spider can be used to scan a computer for Social Security Numbers and other sensitive information. Spider produces a list of files which appear to contain this information, and provides options for you to take immediate actions for remediation.

OpenDLP is another open-source alternative, though more strongly geared towards a centrally managed, server-client envrionment. It can push out scans over network shares and to any Windows Domain connected computer, even without a pre-installed client agent.

Identity finder is an enterprise level PII scanning application and DLP manager.
0
 

Author Comment

by:cesemj
ID: 40339183
Thank you both, I will send an update this evening.
0
Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

 
LVL 63

Expert Comment

by:btan
ID: 40339416
kindly do note the usage and license where applicable from the source in the use case.

Also there is another software program that allows users to quickly scan their computers for sensitive numbers. But this tool does not guarantee your computer is free of social security and credit card numbers. It simply reports files that contain numbers which look like they could pose a security threat.
http://www.utexas.edu/its/products/senf/
0
 
LVL 1

Assisted Solution

by:Travis Martinez
Travis Martinez earned 100 total points
ID: 40340771
Personally...  Forensic analysis tools are what I've leveraged for this type of scan.  Each silo/vendor has a specific niche.  Some have to have physical possession and the scans are intrusive.  Others, will reach out across the network and do it under the radar and quiet.

Here's a list of document tools:

http://www.forensicswiki.org/wiki/Tools:Document_Metadata_Extraction

Here's one specific to files and network access and fairly reasonable considering the offering:

http://www.fid3.com/fi-file-find-features

Sourceforge has Autopsy and a few others.  Sounds like you'll want something with a bit more meat to it and for $300 the FI File Find is a decent value.

Thanks,

Safety First!
0
 

Author Comment

by:cesemj
ID: 40342268
Thank you all again, I am looking at the products and will update his evening.
0
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 50 total points
ID: 40343077
OpenDLP can do a good job, it's not the very best, but for free it's awesome: https://code.google.com/p/opendlp/
-rich
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question