How Utah secures shared data

 

Connecting state and local government leaders

To combat the rising number of cyberattacks, Utah’s Department of Technology Services is encrypting the data it shares internally and externally with other agencies and private entities.

To combat the rising number of cyberattacks, Utah’s Department of Technology Services is encrypting the data it shares internally and externally with other agencies and private entities.

DTS contracted with Virtru, an encryption company, about five years ago to shore up its enterprise cloud-based email system after finding the administrative tools in its previous solution to be problematic. 

“You’re somewhat spoiled when you have an on-prem system because you’re in full control of everything, and being able to deal with the encryption and handle issues as they come through,” said Corona Ngatuvai, enterprise architect at DTS.

Using an outside vendor for encryption makes it harder to perform administrative functions because “you have to go through the vendor,” he said. The vendor had to communicate with its third-party encryption group, which had to authorize a direct discussion, implement the change and then tweak it based on feedback. “It became too cumbersome to manage encryption when there was a middle man,” Ngatuvai said.

Virtru works with DTS’ existing email system, automating the encryption. All users must do is toggle it on or off, depending on the contents of a message. To use it on a mobile device, state workers use an app to encrypt and decrypt messages.

Utah’s 26 agencies have different needs for encryption, Ngatuvai said. “Certain agencies in the state require all messages to be encrypted, so we put a couple of email gateways in place to say if there are any email communications going from this group to any other party in the state or externally, it has to be encrypted,” he said. Other agencies tried that and found it problematic. “If I forget that it’s being encrypted and I just want to order a pizza, I send an email off and the pizza guy is like, ‘What is this?’”

To adjust for that, users can set a default for the percentage of their emails that must be encrypted  -- or they can just turn it on or off.

Ngatuvai said the state has two main use cases for encryption: “Back in the day when you had an email system that’s on-prem, you had the ability to retract an email,” he said. “In a cloud environment, no way.” Encryption, however, allows users to render messages sent accidentally unreadable.

Similarly, to ensure that someone doesn’t forward sensitive content, encryption makes the information readable only by the intended recipients.

“Now that everybody’s comfortable” with encrypted email, DTS has started talking about expanding the service to other datasets, such as documents created as part of collaborative projects or archived data,  Ngatuvai said.

Data-centric security works, said John Ackerly, who founded Virtru with his brother, Will Ackerly, a former National Security Agency architect who developed the Trusted Data Format, encryption tech still used within the DOD. Virtru’s encryption can be integrated into specific workflows such as email, file sharing and internet of things. It’s important for information stored in cloud networks but also for organizations such as state agencies that need to share sensitive data, such as criminal justice, health or payment information.

“They also need to collaborate with thousands of external organizations, so we enable states to embrace the cloud, move sensitive data into these cloud systems and then share data with third parties while always maintaining control over that content,” John Ackerly said.

Maryland began using Virtru in 2015 to shore up its use of Google tools such as Gmail and Google Drive. They embed the platform into automated workflows, including but not limited to email because data comes off many endpoints, such as file sharing.

In Utah, an ongoing challenge is ensuring that encryption is seamless for users. For example, one system requires them to log in with two-factor authentication, but if they are using a new device, it asks for additional security information. That’s a safeguard against bad actors acquiring someone’s credentials, but it happens in the background and is triggered only when necessary.

Adapting to encryption takes some cultural change. To smooth the process, Ngatuvai recommends making workers aware of what’s happening and how it will keep them safe.

“When you think about Buckingham Palace and those guards with the fuzzy hats, you can show that picture and automatically people have some idea of what you’re talking about and where,” he said. “I think that’s what we wanted to accomplish here with our encryption and our use of it: ‘When you see this icon on your desktop, it’s secure.’”

Editor's note: This article was corrected May 28 to say that the Trusted Data Format is still used within the DOD, not the CIA. 

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.