{"id":25592,"date":"2010-12-01T08:17:08","date_gmt":"2010-12-01T13:17:08","guid":{"rendered":"https:\/\/today.uconn.edu\/?p=25592"},"modified":"2011-08-25T12:55:01","modified_gmt":"2011-08-25T16:55:01","slug":"new-director-leads-data-security-push","status":"publish","type":"post","link":"https:\/\/today.uconn.edu\/2010\/12\/new-director-leads-data-security-push\/","title":{"rendered":"New Director Leads Data Security Push"},"content":{"rendered":"<figure id=\"attachment_25584\" aria-describedby=\"caption-attachment-25584\" style=\"width: 254px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2010\/11\/Pufahl7633_lg.jpg\"><img decoding=\"async\" class=\"size-full wp-image-25584 img-responsive lazyload\" data-src=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2010\/11\/Pufahl7633_lg.jpg\" alt=\"Pufahl7633_lg\" width=\"254\" height=\"355\" data-srcset=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2010\/11\/Pufahl7633_lg.jpg 359w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2010\/11\/Pufahl7633_lg-215x300.jpg 215w\" data-sizes=\"(max-width: 254px) 100vw, 254px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 254px; --smush-placeholder-aspect-ratio: 254\/355;\" \/><\/a><figcaption id=\"caption-attachment-25584\" class=\"wp-caption-text\">Jason Pufahl, chief information systems security officer. Photo supplied by UITS<\/figcaption><\/figure>\n<p>In September, Jason Pufahl was named chief information systems security officer for the University of Connecticut.<\/p>\n<p>His appointment to the newly-created position could not have come at a more appropriate time: in August, a laptop computer was stolen from UConn\u2019s West Hartford campus, exposing the names and Social Security numbers of thousands of applicants to the campus \u2013 a serious security breach. In October, it was discovered that the names and Social Security numbers of 23 former students could be found on the Internet, after a faculty member mistakenly stored the list in a way that was not secure.<\/p>\n<p>In both instances, the University notified all those who were affected and offered to pay for two years of identity credit monitoring coverage through the Debix Identity Protection Network. But it was clear to Pufahl, Chief Information Officer David Gilbertson, and President Philip Austin that a major information security initiative was needed to ensure that personal data on campus systems is safe and secure.<\/p>\n<p>\u201cThe incredible growth of electronic data storage in the last 15 years has sometimes outpaced the ability of institutions to ensure its total security,\u201d said Pufahl, who originally came to UITS in 2004 as a security analyst. \u201cThere are too many pockets of data and personal information sitting exposed that have sometimes just been forgotten about or not properly secured.\u201d<\/p>\n<p>In the case of the security breach discovered in October, the student information had been stored a decade ago. In the August breach, the laptop was apparently in an unlocked cabinet and not encrypted.<\/p>\n<p>In announcing the data security initiative at UConn in October, Austin wrote: \u201c\u2026 I have concluded that UConn must, in the next several months, embark upon a comprehensive and deliberate effort to address computer security concerns. Our focus will be on identifying our vulnerabilities and ameliorating them, both with respect to previously acquired and stored data and data that will be acquired and stored in the future.\u201d<\/p>\n<p>The program\u2019s initiatives will focus on the following primary risk areas:<\/p>\n<ul>\n<li><strong>Compliance<\/strong> \u2013 Ensuring the University is taking the necessary steps to protect regulated information such as medical and credit card data;<\/li>\n<li><strong>Education and Training<\/strong> \u2013 Ensuring appropriate security training is available for all faculty, staff, and students;<\/li>\n<li><strong>Data Loss Prevention \u2013 <\/strong>Reducing the risk of data loss due to loss, theft, or technology failures;<\/li>\n<li><strong>Unauthorized Electronic Access <\/strong>\u2013 Protecting resources from network-based threats;<\/li>\n<li><strong>Unauthorized Physical Access<\/strong> \u2013 Preventing unauthorized<em> <\/em>admission to sensitive areas of the University;<\/li>\n<li><strong>Business\/Operational Continuity<\/strong> \u2013 Ensuring that critical University systems are available and University business can continue during emergency situations;<\/li>\n<li><strong>Identity and Access Management<\/strong> \u2013 Systems to ensure that people who need access to systems are the ones that have access to those systems;<\/li>\n<li><strong>Security Governance<\/strong> \u2013 Processes to ensure security decisions are understood and appropriate.<\/li>\n<\/ul>\n<p>The plan is to divide the project into four phases: the first and second phases will entail improving the administrative processes of storing and accessing data. The third and fourth phases will involve deploying technology that will identify unsecured data in all UConn computers and systems. Parts of the various phases will run concurrently with one another.<\/p>\n<p>According to Pufahl, the process of implementing the initiative will require a significant investment of time and resources \u2013 and depend on the cooperation and understanding of the UConn community.<\/p>\n<p>\u201cThe first and second phases will largely be behind the scenes and won\u2019t require any active participation by most students and employees,\u201d he says. \u201cFor the final phases, we will need the campus community to work with us to ensure we can identify and secure data, such as Social Security numbers, that isn\u2019t where it should be or is somehow exposed.\u201d<\/p>\n<p>The technology used in the second two phases will be able to detect information like Social Security and credit card numbers that are vulnerable on computers and servers. Knowing where that sensitive data is will allow UITS and the individual or department that own it to either scrub it from the system or store it securely.<\/p>\n<p>\u201cOur sole concern here is locating and protecting data,\u201d says Pufahl. \u201cIt is not about assigning blame or responsibility to anyone for not storing it correctly or not knowing it\u2019s there. All we care about is making sure the information is secure.\u201d<\/p>\n<p>Pufahl expects the initiative to begin in January 2011.<\/p>\n<p>In the meantime, he suggests everyone at UConn visit the <a href=\"http:\/\/security.uconn.edu\/?page_id=42\" target=\"_blank\">UITS information security page<\/a> and make sure they are doing everything they can to keep their computers and information secure:<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the wake of two recent breaches, UConn is embarking on a major IT security initiative.<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","wds_primary_category":0,"wds_primary_series":0,"wds_primary_attribution":0,"footnotes":""},"categories":[1],"tags":[],"magazine-issues":[],"coauthors":[39],"class_list":["post-25592","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"pp_statuses_selecting_workflow":false,"pp_workflow_action":"current","pp_status_selection":"publish","acf":[],"publishpress_future_action":{"enabled":false,"date":"2026-05-31 07:53:01","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/25592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/comments?post=25592"}],"version-history":[{"count":5,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/25592\/revisions"}],"predecessor-version":[{"id":25823,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/25592\/revisions\/25823"}],"wp:attachment":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/media?parent=25592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/categories?post=25592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/tags?post=25592"},{"taxonomy":"magazine-issue","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/magazine-issues?post=25592"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/coauthors?post=25592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}