Software HDD Encryption: Poll
-
Why is there data on laptops to protect? Why not just keep data from going to them altogether and completely fix the problem?
-
@thecreativeone91 said:
BIOS passwords are trivial to remove.
Sure, but HDD passwords aren't, which is what my point was. If you reset the HDD password you loose the key and might as well just format the drive and start over.
-
@scottalanmiller said:
Why is there data on laptops to protect? Why not just keep data from going to them altogether and completely fix the problem?
Do this is expensive and potentially difficult.
If I was to try to do this in my environment I'd have to start by building either RDS servers or VDI.
-
@Dashrender said:
@scottalanmiller said:
Why is there data on laptops to protect? Why not just keep data from going to them altogether and completely fix the problem?
Do this is expensive and potentially difficult.
It's the least expensive option.
-
@thecreativeone91 said:
@Dashrender said:
@scottalanmiller said:
Why is there data on laptops to protect? Why not just keep data from going to them altogether and completely fix the problem?
Do this is expensive and potentially difficult.
It's the least expensive option.
How would you build your least expensive option?
-
@scottalanmiller said:
Why is there data on laptops to protect? Why not just keep data from going to them altogether and completely fix the problem?
As part of our contract with the State, we are required to.
At this time we do not have another solution.
-
@Dashrender said:
@thecreativeone91 said:
BIOS passwords are trivial to remove.
Sure, but HDD passwords aren't, which is what my point was. If you reset the HDD password you loose the key and might as well just format the drive and start over.
The same goes for HDD Passwords.. Very Very easy. http://www.hddunlock.com/download/ and http://hddguru.com/software/2005.10.02-MHDD/ both will
-
@thecreativeone91 oh wow - I will be testing both of those
-
@thecreativeone91 said:
@Dashrender said:
@thecreativeone91 said:
BIOS passwords are trivial to remove.
Sure, but HDD passwords aren't, which is what my point was. If you reset the HDD password you loose the key and might as well just format the drive and start over.
The same goes for HDD Passwords.. Very Very easy. http://www.hddunlock.com/download/ and http://hddguru.com/software/2005.10.02-MHDD/ both will
Interesting.. If this applies to the FDE module on drives, then you've just shown that FDE is completely pointless and total waste of money!
If that's not what you're saying, I guess you SAM'ing me and using my specific words to try to make me look foolish when the point I'm trying to make is that you can't reset the chip that houses the FDE encryption key without loosing said key and therefore loosing access to the data.
-
@Dashrender said:
@thecreativeone91 said:
@Dashrender said:
@scottalanmiller said:
Why is there data on laptops to protect? Why not just keep data from going to them altogether and completely fix the problem?
Do this is expensive and potentially difficult.
It's the least expensive option.
How would you build your least expensive option?
What additional is needed. Force users to only store files on servers and have them access via a VPN. The Servers should already be encrypted and in a secure location. HIPAA Data should never be on laptops or external drives.
-
@Dashrender said:
@scottalanmiller said:
Why is there data on laptops to protect? Why not just keep data from going to them altogether and completely fix the problem?
Do this is expensive and potentially difficult.
If I was to try to do this in my environment I'd have to start by building either RDS servers or VDI.
Pretty basic first steps if security matters, though. If data is going on our laptops, security isn't a very high focus. You do RDS or VDI or just remote into desktops long, long before you talk encryption of laptops.
-
@thecreativeone91 said:
@Dashrender said:
@scottalanmiller said:
Why is there data on laptops to protect? Why not just keep data from going to them altogether and completely fix the problem?
Do this is expensive and potentially difficult.
It's the least expensive option.
Is it?
-
@g.jacobse said:
@scottalanmiller said:
Why is there data on laptops to protect? Why not just keep data from going to them altogether and completely fix the problem?
As part of our contract with the State, we are required to.
At this time we do not have another solution.
You are contractually obligated to store sensitive data in risky places? Why would a contract mandate that?
-
@thecreativeone91 said:
@Dashrender said:
@thecreativeone91 said:
@Dashrender said:
@scottalanmiller said:
Why is there data on laptops to protect? Why not just keep data from going to them altogether and completely fix the problem?
Do this is expensive and potentially difficult.
It's the least expensive option.
How would you build your least expensive option?
What additional is needed. Force users to only store files on servers and have them access via a VPN. The Servers should already be encrypted and in a secure location. HIPAA Data should never be on laptops or external drives.
That would be the least expensive, which is what was asked... but what stops them from copying files to disk?
-
@thecreativeone91 said:
What additional is needed. Force users to only store files on servers and have them access via a VPN. The Servers should already be encrypted and in a secure location. HIPAA Data should never be on laptops or external drives.
I'll admit that I hadn't considered forcing uses to only save to network share. But this only works on the assumption that users can't use person devices to access the data in the first place.
With most EHRs today being web based this is simply impossible/impractical.
All of my doctors require access to the EHR from any computer they are at. The best we can hope that they are using a 'trusted' computer, but that can't be promised.
So to completely lock this down we'd have to prevent access from all web computers except the VDI/RDS ones, then have the users have a portal into our VDI/RDS solution that is web based. Then we could prevent them from downloading en masse data to whatever device they are on.
If we don't lock the EHR servers to only the VDI/RDS ones and allow them access from any machine, then they can grab whatever reports are generate able to their local machine.
-
@Dashrender said:
@thecreativeone91 said:
What additional is needed. Force users to only store files on servers and have them access via a VPN. The Servers should already be encrypted and in a secure location. HIPAA Data should never be on laptops or external drives.
But this only works on the assumption that users can't use person devices to access the data in the first place.
Letting HIPAA data be stored on personal devices is a even bigger issue. It shouldn't be done. IMO BYOD and PHI do not go together.
-
@coliver said:
That would be the least expensive, which is what was asked... but what stops them from copying files to disk?
Might be the least expensive. Depends. Do these users ONLY have laptops?
-
@Dashrender said:
@thecreativeone91 said:
What additional is needed. Force users to only store files on servers and have them access via a VPN. The Servers should already be encrypted and in a secure location. HIPAA Data should never be on laptops or external drives.
I'll admit that I hadn't considered forcing uses to only save to network share. But this only works on the assumption that users can't use person devices to access the data in the first place.
With most EHRs today being web based this is simply impossible/impractical.
All of my doctors require access to the EHR from any computer they are at. The best we can hope that they are using a 'trusted' computer, but that can't be promised.
So to completely lock this down we'd have to prevent access from all web computers except the VDI/RDS ones, then have the users have a portal into our VDI/RDS solution that is web based. Then we could prevent them from downloading en masse data to whatever device they are on.
If we don't lock the EHR servers to only the VDI/RDS ones and allow them access from any machine, then they can grab whatever reports are generate able to their local machine.
If their EHR is web based, what's the concern? Problem solved on its own. No encryption needed. Well there is, but on the EHR, not on the laptop.
-
@thecreativeone91 said:
@Dashrender said:
@thecreativeone91 said:
What additional is needed. Force users to only store files on servers and have them access via a VPN. The Servers should already be encrypted and in a secure location. HIPAA Data should never be on laptops or external drives.
But this only works on the assumption that users can't use person devices to access the data in the first place.
Letting HIPAA data be stored on personal devices is a even bigger issue. It shouldn't be done. IMO BYOD and PHI do not go together.
Can't up vote enough.
-
@thecreativeone91 said:
@Dashrender said:
@thecreativeone91 said:
What additional is needed. Force users to only store files on servers and have them access via a VPN. The Servers should already be encrypted and in a secure location. HIPAA Data should never be on laptops or external drives.
But this only works on the assumption that users can't use person devices to access the data in the first place.
Letting HIPAA data be accessed on personal devices is a even bigger issue. It shouldn't be done. IMO BYOD and PHI do not go together.
Currently it can't be prevented though - most physicians use their home personal computers to access the EHRs. I know it's done in every health system in my city. While some of them go to ridiculous lengths to provide VPN access, the endpoint is still easily compromised making the efforts to me seem pointless.