Why solid state data destruction is considered so controversial

Solid State Drives (SSD), have become prevalent in the technology world. They can be found in servers, PCs, tablets, USB drives and most types of computing devices today. SSD drives have faster data storage, retrieval, and response rates than traditional Hard Disk Drives (HDD).

SSDs have no moving parts which makes their operation much safer regarding storing data. HDD have several platters and reading devices, called heads, that move over the platters to find the data. These heads occasionally get out of alignment and “crash” into the platter damaging it and making data in those spaces unreadable.

Eventually, every device gets old and needs to be replaced. Both SSDs and HDDs need to be cleaned and or destroyed. Best practice in the destruction of data drives recommends that you wipe the drive and then physically destroy it. Wiping SSDs using traditional methods is not always adequate.

Physical destruction of the drive is the recommended method for SSD devices. However, because of their different composition and storage methodologies, not all physical means of destroying SSDs are adequate to ensure data cannot be retrieved if a large enough piece of the drive remains.

Phiston Technologies has a solution. The MediaVise Compact V-Spike SSD Destroyer is specifically designed to address the specialized needs of SSD destruction. Like other products in the MediaVise line, the V-Spike uses 40,000 pounds of pressure to crush the SSD. The plates that crush the hard drive are equipped with arrays of interlocking razor sharp teeth made from hardened steel. The crushing process will yield up to 187 piercings of the SSD media puncturing the memory chips and controller. (The controller is a key device in an SSD drive since it determines and records the storage locations of the data).  While this is taking place, the V-Spike delivers an electrical charge to the components of the media to disrupt and corrupt the memory chip and controller on the drive to add an extra level of protection to the destruction process.

As with other products in the MediaVise line, Phiston continues to make worker safety a priority. The V-Spike is completely hands off in operation thus reducing the possibility of injury during the destruction process. It is equipped with a HEPA filtration system to prevent the release of harmful particulates that may be released during the destruction process. The built-in noise suppression system keeps volumes well below the OSHA acceptable rate of 85db.

The MediaVise Compact V-Spike SSD destroyer is designed to be used in your server room. The small footprint allows it to be placed on a table or desk. This ensures that you can destroy SSDs before leaving your secure location, eliminating any concerns about chain of custody for your data. Visit us today to see the entire line of disk destruction equipment designed for your use.

Data Security Tips: Mobile Payments

In today’s age especially, security is very important. There are hackers both in and outside the workplace, and your data could easily be compromised if you’re not careful. With that said, the problem is that so many businesses put such a focus on their network security, that they become careless in other aspects. For example, what about making business payments via a credit card? With that said, here is some helpful mobile security advice.

First of all, never share your credit card info with anyone. Whether it’s in or outside the workplace, only share your info when making online payments. Even then, you still need to be careful. Often when you’re on these pages, you’ll be asked if you want to the website to remember your data. You should always answer with no, as a contingency plan of sorts. If you want to go the extra mile, you should also invest in a virtual card number. Basically, it allows you to pay for purchases with your Card Account, without sharing your normal card number. If you’re not familiar with the company you’re paying or the vendor you’re purchasing from, this is a great option to ensure nothing gets compromised.

For more information about being secure when making mobile payments in the workplace, as well as other useful data security tips, feel free to contact us today at Phiston Technologies. We look forward to hearing from you, and assisting you in the best way possible. Whether it’s about mobile payment security, or crushing hard drives.

The Best On-Site Hard Drive Destroyer

Data protection is a skill that is highly sought after in today’s market. Most companies use anti-virus software, firewalls, intrusion detection, encryption and other methods to keep their stored and in-transit data safe from the prying efforts of nefarious characters. They spend time training their staff to avoid phishing schemes, whether through email or telephone calls. Eventually, all electronic devices become obsolete and need to be disposed of. Data is transferred to a new device, and the old device is put into a pile with others waiting for an opportune time to be disposed of.

The storage media, usually a hard drive, optical disk, thumb drive or mobile device sits in a room or storage closet waiting for a pickup from a salvage vendor or disposal company with the data intact on the device. These disposal activities take place on monthly, quarterly or annual schedules. The devices are then turned over to the vendor to deal with, and in some cases, you get a certificate of destruction for the media.

While the devices are waiting for destruction, they can be accessed by any number of employees or contractors. This creates a potential for unauthorized access to the information contained on these storage media types. In some instances, the storage media is removed from the device and sits in an area that is unaudited until someone comes along with a giant magnet, drill, hammer, and chisel, or another mechanical method, to render the component unusable. Some methods are effective, some are not, and again the data is available and accessible during this phase.

A better way to address these concerns would be to destroy the media retention device immediately when it is taken out of service. This should be achieved in an environmentally safe manner. Employee safety is also important in this process as is ease of use. Various regulations from HIPPA, to SOX, require protection of sensitive information. The best way to ensure this is to destroy the data retention device.

Phiston Technologies, a leader in the hard drive destruction arena, provides several cost-effective products for destroying retention media on premises. Their, MediaVise is a clear example of their innovative, ergonomic, easy to use approach to destroying outdated and obsolete media storage equipment.

MediaVise is a desktop unit that allows you to destroy desktop, and laptop hard drives, along with optical media (CD/DVD), Smart Phones, Cell Phones, and PDAs in moments and is compliant with the standards issued by the NSA. Simply turn on the MediaVise, drop the unit into the opening at the top, push the crush button and it will exert 40,000 pounds of pressure to crush the device, rendering it incapable of being accessed again.

It’s ergonomic and safety features, such as HEPA filtration and hands-free execution, will make your Employee Health and Safety group happy. The relatively small size (two feet tall, one foot wide), allow it to be placed inside a small IT room or closet.

While compliance issues often drive the requirements of data protection, physical protection of outdated equipment often gets overlooked. Auditing of storage media that is removed from equipment is almost non-existent in most organizations. Removing these devices from existence immediately, permanently, safely and in a cost-efficient manner, prevents unwarranted and unauthorized access. Visit us today to see the additional products we offer in the area of device destruction to enable you to meet a data protection need that you may not know that you have.

Is Hard Drive Destruction Needed For Your Business?

Whether it’s personal documents or online files, businesses are always trying to secure their sensitive data, and for good reasons to. After all, there are people both within the workplace and on the internet who are looking to compromise sensitive information. In order to get rid of their files completely, some people destroy their hard drive. However, is it really necessary for every business?

Unless you have tons of sensitive info on your computer, such as government and bank documents, hard drive destruction isn’t really necessary. Of course, you always want to make sure no one can get a hold of your info, but there are other methods if you don’t have a lot of private info on your hard drive. If you don’t want to destroy your hard drive, or don’t need to, the next option would be to render your computer inoperable. That way, if a hacker does get a hold of your computer when it’s in the trash, they won’t be able to access anything. Breaking your computer apart with a baseball bat, or even completely dismantling it with a hammer are both great options. Make sure your computer is damaged beyond repair as well.

For more information about hard drive destruction, and whether it’s important or not for your business, feel free to contact us today. We are a small business located in Miami that sells hard drive destruction equipment to companies. Our company looks forward to hearing from you, and assisting you in the best way possible.

Data Security and Risk Management in the Workplace

First of all, risk management is the process of identifying, assessing and controlling threats to an organization’s capital and earnings. With that said, it’s always important that you remain secure in the workplace, as threats can be very unpredictable. Even more so, it’s time to start taking a proactive approach, instead of a reactive one.

Here is the major difference between proactive and reactive. For the former, you’re preparing for threats and taking action before anything even happens. With a reactive approach, on the other hand, you don’t take action until after a threat occurs. The latter is why so many businesses become susceptible to threats. As a business practice, you need to actively work toward taking action even before something occurs.

One of the best proactive approaches to securing your business, is through backing up your data on a regular basis. Aside from using a USB flash drive, always make sure to invest in cloud computing as well. A storing method that backs up all data over the Internet, you don’t have to worry about the data on your hard drive. Even if it somehow got erased, all your data is stored virtually. Not to mention you can access this virtual data via any device with an Internet connection.

For more information about risk management in the workplace, and why it’s important to be proactive instead of reactive, feel free to contact us today at Phiston Technologies. We look forward to hearing from you, and assisting you in the best way possible.