Does an Effective Software-Based Hard Drive Eraser Really Exist?

If you’re thinking about buying a hard drive eraser, solid state data destroyer or other data/media destruction device for your business; you’re one of the wiser business owners. Though many professionals are starting to realize that it’s important to take cyber security precautions, they don’t understand that the final step in cyber security is complete data destruction.

For most companies, cyber security consists of:

  • Data backup and rapid restoration abilities,
  • Network monitoring,
  • Updating and patching,
  • Remote data wiping,
  • Software protection from viruses, malware and other hacking,
  • VPNs,
  • Private network infrastructure,
  • A mobile device protocol and
  • A disaster recovery plan

However, there will always be a time when completely destroying a device is the best option.

Businesses must have quick, effective ways to destroy hard drives from old computers that can’t support new, secure software; zip drives people are no longer using; zip drives no one knows where they came from; old credit cards; outdated cell phones; memory chips from digital cameras; mobile devices and hard drives used by previous and/or disgruntled employees and other random devices and SSD’s. These devices often hold volumes of staff and customer personally identifiable information, (PII).

ZDNet contributor, Robin Harris, recently published an article detailing how to securely erase data on both Windows and Mac computers. Using various methods, (some built-in), you can encrypt your data, reformat it, then encrypt it again. However, when it really comes down to it; would you be surprised to read a news story 2 or 3 years from nowtelling you that hackers found a way to retrieve that data? The only way to truly be sure is to make the right choice. In addition, even Harris concedes that:

“If you work in a regulated industry – such as health care or finance – with a regulatory or fiduciary responsibility for data protection, the foregoing will protect the data, but may not protect you against claims for mishandled data. For that you need something stronger…

A faster option: drive a 10 penny nail through the drive’s disk platters. Few players will attempt a recovery from a physically damaged drive.”

Contact us at Phiston Technologies today. Savvy businesses owners will keep a physical destruction option on hand. Wise business owners face the reality of the times.

Leave a Reply

Your email address will not be published. Required fields are marked *