With the rise of digital technologies, individuals and ...
October 20, 2021
There are 2 methods to securely remove data from IT devices. One method uses a software, the other uses physical destruction. Otherwise known as Secure Data Erasure and Data Destruction.
In short, the data within a storage device is removed using a software-based method by overwriting them. Although we refer to it here as Data Erasure, it is also known as Data Sanitization, Data Wiping, and Data Clearing to name a few.
Based on security guidelines by the National Institute of Standards and Technology (NIST), this method aims to effectively Clear, Purge, and Destroy any and all data making them irretrievable.
First introduced by the Department of Defense (DoD). This method overwrites existing information on individual sectors of the hard disk. This prevents any data recovery using commercially available processes.
DoD 3 or 7-Pass Wipe implements:
So why is it only 4.5 stars?
Free or Paid Software
Formatting a disk creates a new and blank indexing scheme which makes every sector available to write new files. It does not erase the data on the disk. A specialist using free or paid tools could still recover most or all of the stored data.
Known more commonly as physical destruction of hard disks, this method takes its terms literally. Data Destruction is achieved by mechanically altering a storage device or IT equipment's physical characteristics.
This method removes data by rearranging the device's magnetic field. Not all degaussers can delete data permanently as it requires a stronger magnetic field than the disks' coercivity.
Hard Disk Shredder
This method shreds the equipment into small pieces or disintegrates them into minuscule particles. Unless the disk is overwritten beforehand, data can still be recovered by determined experts using forensic recovery tools.
Not recommended. This effort is more dangerous and risky than it is beneficial.
Not recommended. This effort is more dangerous and risky than it is beneficial. Data is still easily recoverable.
Congratulations! You've determined to retire your unused IT assets. Once you've scheduled a meeting with one of our representatives, we will work closely with you on the following:
Once we've audited your IT assets, we can now move to the secure decommissioning process. That includes taking extra precautionary steps.
We have security procedures in place against threats that might harm your brand's reputation. We'll discuss this detail in private.
We'll supply you with full audit reports and documentation. This includes tailored reports needed by your Head of Departments. Should your Finance or Compliance team need specific contracts, we've got that ready too.
You can choose from a range of sustainable and environmentally-friendly solutions for your retired IT assets. Here's an example:
National Association for Information Destruction
Gold Partner for Secure Data Erasure
Quality Management System
Effective Environmental Management System
Occupational Health and Safety
Explore our most popular learning topics.
June 7, 2021
Tech and business teams working together to analyse ...
May 26, 2021
Searching for methods of data destruction Data is ...
You're one step closer to an IT lifecycle plan.
We know it can be a daunting process and we applaud you for starting. Our specialists are ready to help and guide you through your IT Lifecycle process.
You'll be in good hands so let's talk.