I
I
Ivan2018-10-25 00:33:25
Encryption
Ivan, 2018-10-25 00:33:25

How to finally protect user data?

Hello everyone
, I ask for help or advice on how to be.
A number of users work with critical data.
The media is encrypted, all routine procedures are written, everything works ..
But - from time to time I notice passwords on the PC and in other easily accessible places.
It is already useless to punish procedurally, I want to find a technical way out.
How to finally protect yourself from possible data loss?
Now: The user enters two passwords (login and decryption password)
The password is written on a piece of paper and is embedded in
Goodbye security's laptop...
I would like: The user enters two passwords (login and a password for decryption) + an additional action (plugs in a flash drive or sticks a flash drive and enters the password from it, launches the program or whatever else you can think of that definitely cannot be written on a piece of paper explicitly)
Here what additional action can be implemented?
ps in general, I'm even ready to sacrifice data on the PC (all data is backed up), if there is a deletion in the absence of an additional action _))
Thank you in advance

Answer the question

In order to leave comments, you need to log in

11 answer(s)
S
Sergey Gornostaev, 2018-10-25
@sergey-gornostaev

Administrative methods work well if management is really concerned about security. Fines and layoffs leave no one indifferent. If the company is not ready for such drastic measures, then admin sadism has proven itself well:

  • When a password is found on a piece of paper, the password is changed, and the password length limit for that user is increased by one character.
  • You enter under the user account with a password from a piece of paper, delete important files and write a swear letter to the CEO.

X
xmoonlight, 2018-10-25
@xmoonlight

https://www.rohos.com/ (2FA:OTP; USB flash drive, SD-memory cards, U2F keys, Yubikey, PKCS#11 security dongles like SafeNet iKey and popular RFID cards)

A
andreyd234, 2018-10-29
@andreyd234

At my work, everything is easier and more difficult. for the especially forgetful, I force the passwords to be saved in a cell phone under an assumed name, you create an SMS. everything is written there. while it works, the papers have disappeared. if the phone is lost, then who will know where and what the password is, and most importantly where to stick it.

S
stratosmi, 2018-11-28
@stratosmi

A number of users work with critical data.
The media is encrypted, all routine procedures are written, everything works ..
But - from time to time I notice passwords on the PC and in other easily accessible places.
It is already useless to punish procedurally, I want to find a technical way out

Such a procedurally justified and technically organized means as a regular change of passwords forces users to write down passwords. If there was one for 100 years, they would remember.
Find another way that does not stress people, that does not prevent them from working .
The same frequent change of passwords is a good excuse for the security service ("we did our job - it's the users themselves to blame"). But this is not a solution to problems.

T
tiqq, 2018-10-25
@tiqq

Look towards two-factor authentication, since there are ready-made solutions, for example, for php . The result will be: the user enters two passwords (login and a password for decryption) + an additional action (entering a code that they will receive through an application on their phone, such as Google Authenticator).

V
Voll., 2018-10-25
@vollthegreat

Google Authenticator The user enters a password, and the second password is sent to the mobile application, and he must rewrite it and enter it. Essentially the same method as in Steam Guard.

F
fisher_dept, 2018-10-25
@fisher_dept

Are you sure that increasing such security suits business? Did you at least calculate the risks? As for pieces of paper with passwords ... do you have an information security policy implemented? Perhaps it's easier for you to conduct some kind of confrontation and do an internal mini pentest, thereby simulating the actions of an attacker? And according to the result, point out the management to incompetent employees?

C
cssman, 2018-10-25
@cssman

technical methods will not help, when using tokens - tokens will be in a drawer (at best).
only org methods: weakening the password policy where possible (1 password, fewer requirements for strength and frequency of changes), raising awareness, where possible and necessary - demonstrative flogging.

E
Egor Kazantsev, 2018-10-25
@saintbyte

Collect biometrics from them, they definitely won’t share their fingerprints and won’t forget them. And flash drives will be lost, then hackers will make flash drives with viruses. A finger can only be cut off.

T
Tata Lo, 2018-11-01
@TataI0804

What works?
Domain accounts?
Which?
What browsers do you use?
From here you have to look.
Google domains allow for pretty tight control, and Chrome's settings for domain accounts are fine-tuned too.
If something else - then it's not strong

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question