Let’s face it: we’re all trading in our space-absorbing desktops and ship anchor-like laptops for sleek, light tablets and smartphones for cloud storage.
Our data can easily be transferred through various internet services and accessed with a simple internet connection, making the concept of large storage devices like hard drives fade into the past. Financial information, family pictures, medical information, resumes, agreements, digital receipts and music were all stored on storage devices, such as hard drives, CD’s, DVD’s or USB drives. This means the average home, bank, corporation, and even governmental institution has vital information that’s sitting in a back room or in some random drawer with old socks that don’t have a mate. All this information would leave you or your business extremely vulnerable if it ever was to fall into the wrong hands right? Especially if you had recorded yourself singing in the shower. . . That’s just embarrassing.
What do we do with our old storage devices?
There aren’t many things you can do with these obsolete devices. You can’t throw them out, you can’t exactly give them away, and most people don’t know how to properly clear this information from the devices. Enter Phiston Technologies.
Based in Miami, Phiston has a method of completely wiping any trace of data from those unused storage devices that are left lying around, utilizing their MediaVise Destroyer. Their methods meet NSA specifications for data removal and making those storage devices completely unreadable. Give it to them, and you can sleep wonderfully at night with the idea that Phiston has the best technology available to destroy that thumb drive that sat in your end table for years.
What does this all mean?
If you have any unused storage devices with personal information, you are vulnerable to the consequences of identity theft or leaked information. Identity theft is becoming much more prevalent with the age of technology, to the point of an average monetary loss of $1,343, according to CSID (part of Experian). This cost is much higher for any corporation or government institution. Compared to the cost of having the device destroyed, it is almost incomparable.
References: The Real Cost of Identity Theft. (2016, September 09). Retrieved from https://www.csid.com/2016/09/real-cost-identity-theft/