90% of second-hand storage contains personal and business data

Kaspersky research found that up to one in five devices contained data that could be uncovered and extracted immediately

As many as 90% of previously-owned storage media devices such as USB sticks and hard drives contain some form of private and business data from its former owners, a new study by Kaspersky has found.

This data ould include anything from banking documents and company emails to private messages and pornographic content, according to the cyber security firm. 

Kaspersky’s Global Research & Analysis Team (GReAT) made the discovery while analysing the contents of 185 second-hand storage devices, out of which only 11% were found to be entirely clean. The team discovered that as many as one in five devices contained data that could be found and extracted immediately, while almost three-quarters (74%) held data that could still be recovered through file carving.

According to GReAT Europe head Marco Preuß, “the potential damage if personal data falls into the wrong hands is enormous”. 

Identity theft, access to accounts, blackmail or even social ruin of the original owners would be possible. In addition, data could be used to carry out attacks on the previous owner of the device as well as close family, friends or peers,” he said.

The ownership of second-hand devices is becoming a more prevalent practice due to sustainability efforts. Kaspersky found that out of 2,000 UK consumers, 649 had bought a used computer, 802 a mobile device, and 321 had purchased used storage media. 

Related Resource

Ransomware resiliency: The risks associated with an attack and the reward of recovery planning

An overview of the history of ransomware, its potential impact, and best practices to protect IT systems

How to defend against ransomware - free guide to ransomware from VeritasDownload now

However, the well-intentioned practice has potential to turn into a security nightmare. Among the 649 second-hand computers, 13% contained contact details for the previous owner, one in ten held business-related data, and another 10% discovered official documentation such as passports and driving licenses. Similar percentages were found across mobile devices, USB sticks, and hard drives.

The researchers also found documents containing passwords and login details of former owners – which could easily be used to hack into an organisation.

GReAT DACH (Germany, Austria, and Switzerland) head Christian Funk warned that “the criticality of sensitive, personal data seldom loses its effectiveness over time, even if the collection itself is far in the past”.

“Only a complete overwriting of the actual information on a data carrier can remedy this,” he added. 

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021
Veritas Backup Exec 21.3 review: Covers every angle
backup software

Veritas Backup Exec 21.3 review: Covers every angle

14 Oct 2021