Weapons of mass data destruction

What's the best way of securely disposing of your enterprise's sensitive data? Davey Winder investigates...

Indeed, a recent study by the company looking at the methods used by companies to erase data showed that 60 per cent of computers discarded by businesses still contain data when moved onto the second hand market for sale.

This comes as no real surprise, not least because small companies don't have the luxury of a dedicated IT department or the budget to outsource data disposal requirements meaning most will take a DIY approach to this issue.

Advertisement - Article continues below

This is not necessarily a bad thing, and there is no reason why data disposal cannot be carried out securely in-house. However, all too often there won't be any mention of data disposal methodology and process in the IT security policy document. Heck, there may not even be an IT security policy document.

As such there is unlikely to be any procedure in place for the proper logging of hardware or the certification of secure disposal, for example. If that weren't bad enough, with costs always at the forefront of the minds of small business owners, the chances are a resident 'IT expert' will be tasked with using a freeware data erasing utility.

There is nothing inherently wrong with such software, assuming you have researched the market and chosen wisely, but the application of such a utility requires a lot of knowledge to be successful.

Advertisement
Advertisement - Article continues below

Freeware isn't always the cheapest option when you start taking into account the requirement to research, understand and document what you are doing.

Advertisement - Article continues below

An understanding of the technology and the hardware is required. If you have drives that allow data to be stored in Host Protected Areas or Device Configuration Overlays, for example, which have been around since the introduction of the ATA-6 standard, then your erasure software may not spot these hidden partitions contain data.

When it comes down to cost, freeware isn't always the cheapest option when you start taking into account the requirement to research, understand and document what you are doing. This is especially true as you move further up the SMB scale. For example, the more equipment you have, the less money will be saved by tackling data disposal in-house.

IT Pro isn't aware of any freeware that can support multiple devices on a LAN or in an array that comes suitably certified and documented. If you do, feel free to let us know.

The ability to produce 'erasure verification reports' shouldn't be overlooked, especially if there is a chance your enterprise may require a legal compliance audit or the kind of data you process could lead to a lawsuit if it were found to have leaked out of the company.

Featured Resources

Key considerations for implementing secure telework at scale

Identifying the security risks and advanced requirements of a remote workforce

Download now

The State of Salesforce 2020

Your guide to getting the most from Salesforce

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Rethink your cybersecurity strategy for the new world

5 steps to secure the enterprise and be fit for a flexible future

Download now
Advertisement

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

3 Aug 2020
How to use Chromecast without Wi-Fi
Mobile

How to use Chromecast without Wi-Fi

4 Aug 2020
UN report points to a 350% rise in phishing websites at start of 2020
phishing

UN report points to a 350% rise in phishing websites at start of 2020

7 Aug 2020