Tech and business teams working together to analyse ...
Erase and Destroy Data
There are 2 methods to securely remove data from IT devices. One method uses a software, the other uses physical destruction. Otherwise known as Secure Data Erasure and Data Destruction.
In short, the data within a storage device is removed using a software-based method by overwriting them. Although we refer to it here as Data Erasure, it is also known as Data Sanitization, Data Wiping, and Data Clearing to name a few.
Based on security guidelines by the National Institute of Standards and Technology (NIST), this method aims to effectively Clear, Purge, and Destroy any and all data making them irretrievable.
Military Grade Wiping
First introduced by the Department of Defense (DoD). This method overwrites existing information on individual sectors of the hard disk. This prevents any data recovery using commercially available processes.
DoD 3 or 7-Pass Wipe implements:
So why is it only 4.5 stars?
Free or Paid Software
Formatting a disk creates a new and blank indexing scheme which makes every sector available to write new files. It does not erase the data on the disk. A specialist using free or paid tools could still recover most or all of the stored data.
Known more commonly as physical destruction of hard disks, this method takes its terms literally. Data Destruction is achieved by mechanically altering a storage device or IT equipment's physical characteristics.
This method removes data by rearranging the device's magnetic field. Not all degaussers can delete data permanently as it requires a stronger magnetic field than the disks' coercivity.
Shredding or Disintegrating
Hard Disk Shredder
This method shreds the equipment into small pieces or disintegrates them into minuscule particles. Unless the disk is overwritten beforehand, data can still be recovered by determined experts using forensic recovery tools.
Burning or Melting
Not recommended. This effort is more dangerous and risky than it is beneficial.
Drilling or Crushing
Not recommended. This effort is more dangerous and risky than it is beneficial. Data is still easily recoverable.
Steps to how we work
Congratulations! You've determined to retire your unused IT assets. Once you've scheduled a meeting with one of our representatives, we will work closely with you on the following:
- 1Logistics and Decommissioning
- 2IT Asset Audit
- 3Mobile Device Audit
- 4Ascertaining Security Risks and Procedures
Once we've audited your IT assets, we can now move to the secure decommissioning process. That includes taking extra precautionary steps.
We have security procedures in place against threats that might harm your brand's reputation. We'll discuss this detail in private.
We'll supply you with full audit reports and documentation. This includes tailored reports needed by your Head of Departments. Should your Finance or Compliance team need specific contracts, we've got that ready too.
You can choose from a range of sustainable and environmentally-friendly solutions for your retired IT assets. Here's an example:
- 1Recycling for 'Beyond Economic Repair' Equipment
- 2IT Asset Remarketing
- 3Employee Buyback Programmes
- 4IT Asset Donation and Deployment Programmes
Partnerships and Certifications
National Association for Information Destruction
Gold Partner for Secure Data Erasure
Quality Management System
Effective Environmental Management System
Occupational Health and Safety
Don't know where to start?
Explore our most popular learning topics.
May 26, 2021
Searching for methods of data destruction Data is ...
May 20, 2021
This article is based on the research conducted ...