Your Trusted IT Asset Management Partner

__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"0aa6d":{"name":"Main Accent","parent":-1}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"0aa6d":{"val":"var(--tcb-skin-color-0)"}},"gradients":[]},"original":{"colors":{"0aa6d":{"val":"rgb(55, 179, 233)","hsl":{"h":198,"s":0.8,"l":0.56,"a":1}}},"gradients":[]}}]}__CONFIG_colors_palette__
__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"62516":{"name":"Main Accent","parent":-1}},"gradients":[]},"palettes":[{"name":"Default Palette","value":{"colors":{"62516":{"val":"var(--tcb-skin-color-0)"}},"gradients":[]}}]}__CONFIG_colors_palette__
Let's Talk

Erase and Destroy Data

There are 2 methods to securely remove data from IT devices. One method uses a software, the other uses physical destruction. Otherwise known as Secure Data Erasure and Data Destruction.


Data Erasure

In short, the data within a storage device is removed using a software-based method by overwriting them. Although we refer to it here as Data Erasure, it is also known as Data Sanitization, Data Wiping, and Data Clearing to name a few.

Data Sanitization

NIST 800-88

Based on security guidelines by the National Institute of Standards and Technology (NIST), this method aims to effectively Clear, Purge, and Destroy any and all data making them irretrievable.

  • Most Recommended Method
  • Disk is Safe to Reuse
  • Hard Disk Drive (HDD)
  • Solid State Drive (SSD)
  • Mobile Devices
  • USB Drives
  • New and Developing Technologies
  • Benefits List is Non-Exhaustive

Military Grade Wiping

DoD 5220.22-M

First introduced by the Department of Defense (DoD). This method overwrites existing information on individual sectors of the hard disk. This prevents any data recovery using commercially available processes. 

DoD 3 or 7-Pass Wipe implements:

  • Pass 1: Writes a '0' and verifies
  • Pass 2: Writes a '1' and verifies
  • Pass 3: Writes randomly & verifies
  • Repeat for 7-Pass Wipe

So why is it only 4.5 stars?

  • Has issues with SSD devices
  • Time consuming process

Basic Reformatting

Free or Paid Software

Formatting a disk creates a new and blank indexing scheme which makes every sector available to write new files. It does not erase the data on the disk. A specialist using free or paid tools could still recover most or all of the stored data.

  • Clears disk for new files
  • Time consuming process
  • Viruses could still remain
  • Data is recoverable
  • Non-compliant method
  • Long-term reputation risk
  • Long-term financial risk
  • High risk to data breach

Data Destruction

Known more commonly as physical destruction of hard disks, this method takes its terms literally. Data Destruction is achieved by mechanically altering a storage device or IT equipment's physical characteristics. 

Degaussing

Demagnetiser

This method removes data by rearranging the device's magnetic field. Not all degaussers can delete data permanently as it requires a stronger magnetic field than the disks' coercivity.

  • Rapid sanitization process
  • Audit compliant
  • Proven solution when done right
  • Secure method for brand reputation
  • Works with un-erasable disks
  • Reduces data breach risks
  • Hard disk cannot be reused
  • Does not work with SSDs
  • No value for the original hardware

Shredding or Disintegrating

Hard Disk Shredder

This method shreds the equipment into small pieces or disintegrates them into minuscule particles. Unless the disk is overwritten beforehand, data can still be recovered by determined experts using forensic recovery tools.

  • Audit compliant
  • Proven solution when done right
  • Reduces data breach risks
  • Works with any type of hard disk
  • Hard disk cannot be reused
  • Difficult to monitor or track
  • Not environmentally-friendly
  • No value for the original hardware

Burning or Melting

Incinerators

Not recommended. This effort is more dangerous and risky than it is beneficial. 


Drilling or Crushing 

Household Tools

Not recommended. This effort is more dangerous and risky than it is beneficial. Data is still easily recoverable.


Steps to how we work


Step 1: Audit and Inspection

Congratulations! You've determined to retire your unused IT assets. Once you've scheduled a meeting with one of our representatives, we will work closely with you on the following:

  1. 1
    Logistics and Decommissioning
  2. 2
    IT Asset Audit
  3. 3
    Mobile Device Audit
  4. 4
    Ascertaining Security Risks and Procedures

Step 2: Security Services

Once we've audited your IT assets, we can now move to the secure decommissioning process. That includes taking extra precautionary steps.


We have security procedures in place against threats that might harm your brand's reputationWe'll discuss this detail in private.

Step 3: Accreditation

We'll supply you with full audit reports and documentation. This includes tailored reports needed by your Head of Departments. Should your Finance or Compliance team need specific contracts, we've got that ready too.

Step 4: Adaptive Green Solutions

You can choose from a range of sustainable and environmentally-friendly solutions for your retired IT assets. Here's an example:

  1. 1
    Recycling for 'Beyond Economic Repair' Equipment
  2. 2
    IT Asset Remarketing
  3. 3
    Employee Buyback Programmes
  4. 4
    IT Asset Donation and Deployment Programmes

Partnerships and Certifications

NAID

National Association for Information Destruction

Blancco

Gold Partner for Secure Data Erasure

ISO 9001

Quality Management System

ISO 14001

Effective Environmental Management System

ISO 45001

Occupational Health and Safety

Other Services

Auditing can be daunting and overwhelming. Let us help you audit your IT assets either on-site at your premise or off-site at our facilities.

Our goal is to refurbish and recycle used IT equipment safely. All while protecting your company data and the environment.

Keep your budget committee happy and have a strategy in place. As a global remarketer, we can extract the best value for you.

Moving across city, state, or country lines? We can get it done for you safely and securely from rack-to-rack. 

Want to do your part for the community? We'll help you achieve your CSR goals while ensuring your equipment are safe to deploy.

Every phase in IT lifecycle management comes with its associated risks. We have stringent measures in place for each critical juncture.

Don't know where to start?

Explore our most popular learning topics. 

Have a question? We're a message away.