Compare cert salaries and plan your next career move
redz wrote: » Am I just paranoid...? Cuz... I agree with jmritenour...
redz wrote: » Paranoia is one of the domains.
beads wrote: » Easiest way to send via email is to encrypt with a self executing WinZip file. Provided of course you have a full copy of WinZip and can handle telling HR a password - preferably over the phone - not in a separate email.
cyberguypr wrote: » This message was brought to you by a CISSP who did helpdesk for a long time.
beads wrote: » Easiest way to send via email is to encrypt with a self executing WinZip file. Provided of course you have a full copy of WinZip and can handle telling HR a password - preferably over the phone - not in a separate email. Also keep in mind that if all your sending is a SSN and no other PII, your probably fairly safe. Though the idea from a privacy and confidentiality aspect makes me question HR's mettle a bit. That is to say if they are willing to compromise you on something as simple as this what else are they doing with PII? All nice and compliant like. - B Eads
apr911 wrote: » +1 Im buying a house in another state and have therefore been corresponding with my mortgage broker almost entirely through email. Every document I sign and return gets put into a password protected zip file. It might not be the most secure but it is more secure than clear text. That being said, while I understand your concern (yes, another paranoid CISSP), the only reason I am bothering to do that is because of the sheer volume of documents being sent and the fact that those documents consist of not just my social security number, name, address and signature but bank statements and account numbers too. For a single document containing only some personally identifiable information, I would send it without encrypting it. Especially to HR because, as cyberguypr points out, inconveniencing the HR person could see the process slow significantly as they re-prioritize your correspondence in a negative manner. Add to that they are unlikely storing this information in the most secure manner and it really doesnt matter what you do to encrypt it before sending, it still going to be left unencrypted somewhere. Ultimately, as Iris (and others) points out, your SSN gets used in so many places that true security/secrecy of it is impossible. Yes you can exercise due diligence and not post it publicly but there are so many ways and places it can become compromised that you should be monitoring for identity theft as a matter of course not just when you suspect something. Finally, your talking about a single document in a single email and while it could be compromised, that assumes that: A. Someone is listening and capturing your traffic B. They have the time to sort through all the noise to recompile the data which would be like finding a needle in a haystack or a few flecks of gold dust in the river There are easier ways to get the information being sought.
jvrlopez wrote: » To be honest, if you're going to send an employer, one who has interest in YOU and is taking time out of their schedule to give you an opportunity, an email stating, "I don't feel comfortable sending you my SSN over email regularly, so here is an encryption program that you must install on your WORK computer, a file attached that has my SSN encrypted, and I will call you at a later time to relay the password for the file, you are doing nothing more than turning them off and sending them towards other candidates.
redz wrote: » Yeah, I don't want the majority of you anywhere near regulated or sensitive unregulated data types.
networker050184 wrote: » I'd just email it as I have in the past.
Terrie wrote: » However, if you're concerned about sending them this information via email, consider that no matter what you do, HR will likely be sending your information back and forth via... email.
pert wrote: » unknown security practices.
RouteMyPacket wrote: » Calm down Francis.
redz wrote: » Their security practices aren't all that unknown if they're asking you to send a full social security number via unencrypted email.
redz wrote: » Companies have to treat regulated or unregulated sensitive data appropriately to be able to show due diligence and due care in the event of a compromise resulting in a lawsuit. My issue with everyone thinking "it's not a big deal, whatever" isn't in disagreement with the statement that there are easier ways to obtain it, and in practice, just sending an SSN really isn't that big of a deal. My problem is, in the event of a breach, business practices like this are what cause companies to lose lawsuits and cost them hundreds of millions of dollars because they prefer to cut corners than to protect themselves, their clients, and their employees. JP Morgan is well on their way to a loss of over nine figures for mishandling SSNs right now (admittedly, different circumstances).
apr911 wrote: » See now you're talking about something different entirely.
redz wrote: » I wrote in there that just sending an SSN really isn't that big of a deal.
redz wrote: » Lackadaisical treatment of sensitive data that is under your control, simply because "eh they'll do it anyways" or "eh it's out there anyways" does not give me the impression that one would be competent to protect it in the future.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.