{"id":3244,"date":"2014-03-08T12:38:19","date_gmt":"2014-03-08T17:38:19","guid":{"rendered":"http:\/\/sites.scranton.edu\/tag\/?p=3244"},"modified":"2014-08-19T11:50:52","modified_gmt":"2014-08-19T15:50:52","slug":"encryption-with-truecrypt","status":"publish","type":"post","link":"https:\/\/sites.scranton.edu\/tag\/2014\/03\/08\/encryption-with-truecrypt\/","title":{"rendered":"Encryption with TrueCrypt"},"content":{"rendered":"<p style=\"text-align: left\"><span style=\"color: #ff0000\"><em>Update 2014-07-02: Support for TrueCrypt has been discontinued! Information Security <a title=\"Encryption with 7-Zip \u2013 Instructions\" href=\"http:\/\/sites.scranton.edu\/tag\/2014\/07\/03\/encryption-with-7-zip-instructions\/\" target=\"_blank\">recommends using 7Zip<\/a> instead &#8211; see <a href=\"http:\/\/sites.scranton.edu\/tag\/files\/2014\/07\/7-Zip-Encryption-Instructions.docx\">instructions (.docx)<\/a>.<\/em><\/span><\/p>\n<p style=\"text-align: left\">&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p style=\"text-align: center\">\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/www.ddco.com\/blog\/wp-content\/uploads\/2013\/03\/truecrypt-logo.jpg\" alt=\"\" width=\"384\" height=\"111\" \/><\/p>\n<p>At our <a href=\"http:\/\/sites.scranton.edu\/tag\/2014\/02\/14\/tag-meeting-notes-2014-02-12\/\" target=\"_blank\">last TAG meeting<\/a>, Adam Edwards and Scott Finlon from Information Security demonstrated automated <a href=\"http:\/\/www.scranton.edu\/pir\/its\/identityFinder.shtml\" target=\"_blank\">Identity Finder<\/a> scans as well as encrypting files with <a href=\"http:\/\/www.truecrypt.org\/\" target=\"_blank\">TrueCrypt<\/a> (which is free and open source :).\u00a0At our next TAG meeting, we&#8217;ll be starting to identify which departments can move forward with automated scans &#8212; so as a reminder, you&#8217;ll all want to make sure that any confidential or sensitive information stored on your desktop is safely encrypted.<\/p>\n<p>Scott has sent along some <a href=\"http:\/\/sites.scranton.edu\/tag\/files\/2014\/03\/TAG-TrueCrypt-instructions.pdf\" target=\"_blank\">brief \u00a0instructions (PDF)<\/a> for encrypting a folder of files using TrueCrypt &#8212; the first page is set up and the second is everyday usage. \u00a0Please contact <a href=\"mailto:security@scranton.edu\" target=\"_blank\">Information Security<\/a> if you have any questions about encryption.<\/p>\n<p>You can also run your own Identity Finder scan in the meantime &#8211; see <a href=\"http:\/\/www.scranton.edu\/pir\/its\/idfinderImages\/Quick%20Guide.pdf\" target=\"_blank\">IR&#8217;s Quick Guide<\/a> if you need help getting started.<\/p>\n<p>Many thanks to Adam and Scott for their guidance on this issue!<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Update 2014-07-02: Support for TrueCrypt has been discontinued! Information Security recommends using 7Zip instead &#8211; see instructions (.docx). &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;- At our last TAG meeting, Adam Edwards and Scott Finlon from Information Security demonstrated automated Identity Finder scans as well as encrypting files with TrueCrypt (which is free and open source :).\u00a0At our next TAG meeting, [&hellip;]<\/p>\n","protected":false},"author":80,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[485,494,497,498],"tags":[768,588,648,669,766,701],"class_list":["post-3244","post","type-post","status-publish","format-standard","hentry","category-announcements","category-security-2","category-technology-training","category-tutorials","tag-encryption","tag-identity-finder","tag-pii","tag-security","tag-truecrypt","tag-tutorial"],"_links":{"self":[{"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/posts\/3244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/users\/80"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/comments?post=3244"}],"version-history":[{"count":5,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/posts\/3244\/revisions"}],"predecessor-version":[{"id":3386,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/posts\/3244\/revisions\/3386"}],"wp:attachment":[{"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/media?parent=3244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/categories?post=3244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.scranton.edu\/tag\/wp-json\/wp\/v2\/tags?post=3244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}