In-depth

Watch: Now this is how you securely erase data

Delete your data properly - by smashing your laptop to pieces

If you're getting rid of your old laptops or hard drives, making sure that all your data is wiped off them first can be a pain. After all, the last thing you want is some nefarious dumpster-diver recovering your personal information or documents. However, while traditional methods are all well and good, there's nothing like the peace of mind that comes from smashing your storage devices into tiny little pieces with some heavy machinery (if your kit is slow and frustrating to use then this is also pretty stress-relieving).

That's exactly what security company F-Secure has done, with some help from the Hydraulic Press Channel on YouTube. Using an industrial-grade press, they obliterated several different kinds of storage media and other tech, including hard drives, floppy disks, mobile phones and even (with the help of some liquid nitrogen) an office printer.

The people at Hydraulic Press also used an air cannon to destroy other items, including a tablet, a laptop and more. The results were even more spectacular, with chunks of circuitry and shards of plastic flying as the cannon demolished hardware.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019
Visit/security/29204/how-can-you-protect-your-business-from-crypto-ransomware
Security

How can you protect your business from crypto-ransomware?

4 Nov 2019
Visit/security/ddos/28039/how-to-protect-against-a-ddos-attack
Security

How to protect against a DDoS attack

25 Oct 2019
Visit/back-up/29084/how-to-enhance-your-backup-strategy
backup

How to enhance your backup strategy

10 Oct 2019

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/operating-systems/microsoft-windows/354297/this-exploit-could-give-users-free-windows-7-updates
Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019