Directive Blogs
Your Data is Truly Everywhere… So Be Careful What You Throw Out
There’s a lot of hardware in the modern business setup, and most of it is computerized to some degree. As such, ridding your business of any of it has become a more involved process than it once was… all in the name of data security.
The simple fact is that more devices than ever have memory, which can easily cause serious problems if you are not careful.
Hardware You Might Not Consider Likely Has Data Stored On It
According to the Federal Trade Commission, approximately 60% of used copiers that are sold at auction still contain sensitive data left by their previous owners. This is because merely deleting a file only hides it. The data itself remains on the device until it is overwritten or actively destroyed.
Therefore, if a printer or multipurpose scanner is ultimately resold or returned to a dealership without its data being wiped, it is a simple matter for a hacker to recover thousands of sensitive documents with software that costs around $20.
This Hardware Needs to Be Sanitized Before Disposal or Resale
So, how does one sanitize hardware that is on its way out?
Logic may tell you to start with a factory reset—and while this is a perfectly acceptable starting point, it cannot be your only means of removing data. This is because these resets will frequently stop after clearing your hardware’s settings, leaving the data storage untouched.
To really clear the data from your hardware, it is best to follow the guidance of the National Institute of Standards and Technology (NIST):
- Clear the memory by using software to overwrite the disk with randomized ones and zeros.
- Purge the drive by completing a secondary, more intensive overwrite process that clears every nook and cranny of your data.
- Destroy the data by actively removing the hard drive and physically shredding and crushing it as required for industries handling highly sensitive data, such as healthcare or legal.
We Can Help You Properly and Securely Cycle Through Your Business Hardware
To do so, we take a multistep approach:
- We audit your hardware: If it has a brain of sorts, we find and identify it, from printers and scanners to smart whiteboards and routers.
- We ensure your data is encrypted: We’ll configure your business tech to encrypt all data at rest, rendering it useless if a drive is stolen.
- We handle the destruction: When the time comes to upgrade, we’ll take charge of removing and destroying data from your old hardware, ensuring you have the proper documentation for compliance needs.
Retiring Your Technology is the Singular Time Data Loss is Desirable
We can help you plan and undergo a successful equipment refresh. Find out more by reaching out at 607-433-2200.

Comments