Information Security Gadget Wish List for Win7

I like Win7 gadgets.  Although I don’t use many of them, I am attracted to the idea of their potential.  Specifically how they could be used to improve information security within an organization.  I am not a coder, but do have a few ideas for Win7 Gadgets which could empower users to wield security to protect their system and information.  Here is my list:

  1. System Login Tracker.  Applet showing which systems are currently logged in with the users credentials.  Purpose: Inform user which systems are being controlled under their identity and authorization.  Users can intercede suspicious access as well as logout from unneeded systems

  2. Login History Tracker.  Applet showing the last time a system (or application) was logged-in by the users credentials.  Purpose: Inform the users when their credentials were last used, to identify situations where their login/password have been stolen or inappropriately cached and are accessing systems without the users knowledge

  3. Password Countdown.  A countdown applet showing the number of days until their passwords expire.  As the expiration date approaches, the color changes from green, to yellow and eventually red.  Links to corporate password policy rules and instructions on how to change and synchronize passwords aid the user experience.  Purpose: Awareness of those pesky password expirations.  No surprises and links to help the process

  4. System Security Confidence.  An applet which shows the current state of security confidence for the client.  Show outstanding application/OS patches and AV/firewall/proxy status.  Purpose: An easy way to know if your system is current with security controls, therefore how confident your work is secure

  5. Network Connections Tracker.  A novice friendly applet to show active network connections to shared drives and servers.  Ability to click unwanted connections to disconnect them.  Purpose: User awareness of the systems the client is connecting to.  Removal of unneeded connections can improve client performance and reduce security risks

  6. Secure Document Manager.  Applet to flag sensitive or controlled documents (example: top secret) and the provide a list of those files on the system.  Secondary function integrates with encryption solutions to enable the user to secure identified files.  Purpose: Empower users to flag their sensitive data and track which exist on the system.  Also is a convenient way to implement encryption of specific files at the discretion of the user

  7. Encrypted File Explorer.  Applet to show a list of encrypted files on the system, across email, on secondary drives etc. within a file explorer window.  Purpose: Convenient way to identify, track, and manage encrypted files on the system

  8. Legacy File Manager.  Applet to identify files which likely exceed the corporate retention guidelines and the ability to mark them for future deletion.  Purpose: Assist users in complying with challenging corporate retention guidelines and clean the system for better performance

  9. Privacy Data Finder.  Client query search with Personal Identifiable Information (PII) parameters to locate files on the system likely to contain sensitive personal data.  Functions to secure (encrypt or delete) is a bonus.  Link to the corporate privacy site is convenient for user training and FAQ's.  Purpose: User awareness to know what privacy data is likely on the system and give them the tools to secure the information

Who will be the enterprising software engineers to develop these helpful security gadgets?

Published on Categories Archive
Matthew Rosenquist

About Matthew Rosenquist

Matthew Rosenquist is a Cybersecurity Strategist for Intel Corp and benefits from 20+ years in the field of security. He specializes in strategy, measuring value, and developing cost effective capabilities and organizations which deliver optimal levels of security. Matthew helped with the formation of the Intel Security Group, an industry leading organization bringing together security across hardware, firmware, software and services. An outspoken advocate of cybersecurity, he strives to advance the industry and his guidance can be heard at conferences, and found in whitepapers, articles, and blogs.