From laptops to smartphones, solid state data destruction is needed in more places than you think!

When people think of solid state storage volumes, they probably only think of things such as thumb-drives or other devices that fit into a USB port on the back of their systems units.  But due to miniaturization of computer equipment during the last decade you might not know that the hard-drive in your computer, especially a laptop, is probably a solid state storage device.  Solid state devices use less power, produce less heat, and are quieter than typical hard drives, which make them perfect for phones, tablets, and laptops!

Solid state devices are found everywhere.  The chip on your credit card as well as the SIM card that allows your smartphone to connect to your service carrier are both solid state devices.  Solid state devices hold an inordinate amount of data for taking up such a small area.  An area so small, in fact, that many people don’t consider all the places their information is being held!  From solid state MP3 devices such as iPods, to smartphones, notebook and tablet hard-drives, to external hard-drives, your information might be contained on a solid state device.  There is no telling how long the media itself lasts when it comes to solid state, since it is resistant to environment, electrical current, and other factors which might allow data to be corrupted naturally over time.  Solid state devices can withstand a lot of punishment and still retain all the data that was put on them for years to come.

Phiston data crushers aren’t just valuable when it comes to in-rack mounted and portable data destruction devices.  They are also effective in complete destruction of solid state devices as well.  Without physically destroying the solid state media, information can still be extracted from the devices for years, if not decades to come. In other words, if you want your information entirely secure, the only way to ensure this is through complete piercing and pulverization of storage media through physical means.

Contact us to find out how Phiston has you covered when it comes to solid state data destruction.

Why Unsecured Data Disposal is a Security Risk

Hard Drives are never going to last you forever and one consequence of this is that many people dispose of these by simply chucking them in the trash. This is one of the most unsafe methods and puts your data at extreme risk. If someone should happen to go through the trash or recycling where you disposed of your hard drive or other media device then the drive would give them access to your data.

Resetting your drive to factory settings before disposing of it is not enough to protect yourself from data theft. There is almost always some data that cannot be disposed of this way and anyone with reasonable technical knowledge will be able to access that data and if they get their hands on this data then it can put your personal information at risk. Your data could end up being used to buy things on your credit cards or something much worse. Identity theft or giving a hacker the access credentials to your bank account for instance.

The best and simplest way to avoid this is to fully destroy your media devices. By making sure that you destroy your hard drive, SSD or whatever other media storage device you happen to be using to the point that access to that storage media is impossible due to how thoroughly your old storage device has been wrecked then you can avoid putting your personal information at risk if some hacker gets their hands on your storage devices.

The best way for you to accomplish this goal is by using Phiston Technologies’ services to ensure that your drives are effectively crushed, mangled and otherwise rendered inaccessible in order to prevent anyone from accessing that data. For more information and to select the type of service that best fits your media destruction needs, contact us today!

Destruction – The Only Way to Safely Dispose of Solid State Data-Containing Devices

Solid state data storage devices range from SSDs (Solid State Drives) to cell phones. This variety can make it seem hard to properly dispose of them all when it comes time to decommission them. Fortunately, there is no need for it to be difficult. Our Phiston MediaVise Compact V-Spike SSD Destroyer is made to permanently disable the electronic components of SSDs and other solid-state devices.

Physical Destruction

Our system doesn’t just fold SSDs in half or cause other minor damage. Instead, interlocking spears chew, crush, and mangle the entirety of the media. This alone physically destroys it enough to render it unreadable by normal means. However, this is just the first step that the SSD Destroyer takes to ensure that the data on your solid state device can never be read again.

Electrical Destruction

Physically mangling the device will thwart almost all read attempts, but we take things one step further just to be sure. As the device is being destroyed, the SSD Destroyer also sends crippling, pulsed jolts of electricity through the media. These fry the electrical components by overloading them. The end result is a completely destroyed data storage device.

Why Destroy Data So Thoroughly?

The short answer is to prevent snooping. Doctor’s offices, companies, and governmental agencies are among those who must have absolute data security. Yet, these groups also need to be able to throw away old computers, cell phones, tablets, external hard drives, laptops, and other such machines. The only way to do so – without leaving openings for security breaches – is to destroy data-containing components.

Thanks to our MediaVise Compact V-Spike SSD Destroyer, there is no need for sensitive devices to ever leave the confines of organization property before destruction. It is easy to set the Destroyer on a desk or table and run your devices through. By the time they reach the outdoor garbage bin, the devices will never function again.

To find out more about our solutions for destroying SSDs and other solid-state devices, just contact us. We’ll be glad to discuss our solutions for your data disposal needs.

Two Reasons Why Valuable Trash Is a Security Risk

People are going to hunt through your business’s garbage. That doesn’t mean people are just going to sift through the trash bags (though they certainly might). It means that data security thieves know how to identify the signs that your company is throwing away valuable things and not protecting them.

Destruction is the only way to protect information. Here’s why:

1. If you touched the information, you’re liable for it.

‘Throwing away’ is a mindset that can’t exist anymore in the business world. Once you have information, you have that information for as long as it exists. It doesn’t matter if you sell the computers that held the information, you shredded the papers that hold personal details, or everything is on an old server in the back. All of it is your company’s responsibility.

So restructure your company so every scrap of data is accounted for. Count your company flash drives and maintain a strict inventory. Destroy papers, don’t just shred them. When it’s time to get rid of an old computer, don’t delete everything on the hard drive and then sell it. Destroy it.

2. Poor trash security indicates poor data security.

Thieves are constantly on the lookout for signals that your business will be a worthwhile target. Things like propped on doors and lax security pass enforcement are huge tip-offs. But bags of unprotected trash full of mostly-whole items is just as clear of a signal.

If you have stacks of paper in trash bags without any sign of shredding, criminals can assume that papers are loosely stacked on employee desks, too. If you’re throwing away whole hard drives, your cyber-security will be easy to beat. Even if these extrapolations aren’t true, you’ll still be faced with more attempted security breaches. Eventually, one might get through.

Don’t take the risk. Contact us at Phiston Technologies for the right tools to complete destroy information before it leaves your hands.

Secure data disposal

Some breaches of data security can be the result of data hacks, such as the Equifax breach in 2017. Equifax holds personal information on millions of consumers in databases that include names, addresses, social security numbers, credit and financial information. The company reported that the hack into their systems was so complete that sensitive information on almost half the population of the U.S. was accessed.

According to research from Javelin Strategy and Research, stolen identities resulted in $16 billion of theft in 2016. (https://www.cnbc.com/2017/02/01/consumers-lost-more-than-16b-to-fraud-and-identity-theft-last-year.html)

With rewards on this scale, cyber criminals are constantly probing for any weak links in the life cycle of stored data, and an important element in any cyber security solution is the secure disposal of the hardware that holds personal information.

Outsource or In-house

The ability of forensic software to recover data means that deleting or overwriting files is no longer an effective way of destroying sensitive digital data. The only guaranteed way to do this is to physically destroy the storage device. The decision on whether to destroy obsolete hardware in-house or to outsource the process should take into consideration the type and volume of information that is being stored and how often storage devices will be destroyed.

Outsource

Companies often find it more convenient and cost effective to contract this out to a reputable dedicated data disposal company. A specialist company is able to stay current with evolving legislation concerning data disposal and has the specialist equipment designed to securely destroy data storage media.

Phiston Technologies offers a leading data destruction service for a range of media devices and will also provide a Certificate of Destruction for your audit requirements. Visit us here for more information.

In-house

Physically destroying a storage device requires specialist equipment since data can still be retrieved from a significant fractions of a disk. Investing in a shredding unit that has a long service life can be a financially viable option that allows a business to maintain absolute oversight over the information it holds.

To help ensure businesses are compliant with the latest data protection regulations, Phiston Technologies design and manufacturer bespoke equipment for the safe and complete destruction of a range of data storage media.

 

The leading innovator in the market, Phiston Technologies has clients that include state institutions and corporations such as Facebook and Symantec as well as numerous small to medium size businesses. If you need to securely dispose of medical information, financial data or other sensitive digital data, contact us.