90% of second-hand storage contains personal and business data
Kaspersky research found that up to one in five devices contained data that could be uncovered and extracted immediately
This data ould include anything from banking documents and company emails to private messages and pornographic content, according to the cyber security firm.
Kaspersky’s Global Research & Analysis Team (GReAT) made the discovery while analysing the contents of 185 second-hand storage devices, out of which only 11% were found to be entirely clean. The team discovered that as many as one in five devices contained data that could be found and extracted immediately, while almost three-quarters (74%) held data that could still be recovered through file carving.
According to GReAT Europe head Marco Preuß, “the potential damage if personal data falls into the wrong hands is enormous”.
“Identity theft, access to accounts, blackmail or even social ruin of the original owners would be possible. In addition, data could be used to carry out attacks on the previous owner of the device as well as close family, friends or peers,” he said.
The ownership of second-hand devices is becoming a more prevalent practice due to sustainability efforts. Kaspersky found that out of 2,000 UK consumers, 649 had bought a used computer, 802 a mobile device, and 321 had purchased used storage media.
Ransomware resiliency: The risks associated with an attack and the reward of recovery planning
An overview of the history of ransomware, its potential impact, and best practices to protect IT systemsDownload now
However, the well-intentioned practice has potential to turn into a security nightmare. Among the 649 second-hand computers, 13% contained contact details for the previous owner, one in ten held business-related data, and another 10% discovered official documentation such as passports and driving licenses. Similar percentages were found across mobile devices, USB sticks, and hard drives.
The researchers also found documents containing passwords and login details of former owners – which could easily be used to hack into an organisation.
GReAT DACH (Germany, Austria, and Switzerland) head Christian Funk warned that “the criticality of sensitive, personal data seldom loses its effectiveness over time, even if the collection itself is far in the past”.
“Only a complete overwriting of the actual information on a data carrier can remedy this,” he added.
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download