Business enterprises are recording a slew in the use of solid state drives instead of the conventional electromechanical disks. Companies are ditching the use of the spinning platters in electromagnetic in traditional drives and employing the use of memory chips of solid state disks to store information. However, the new and efficient data storage technique poses an increasing risk, as data destruction and sanitation methods are still novel ideas that many IT specialists are not familiar with. This blog will discuss two solid state data destruction, and sanitizing practices that are a great way business enterprises can employ to secure sensitive data.
Physical data destruction
Among the solid state data, destruction methods available is the physical destruction option. These are mechanical devices that physically manipulate a solid state drive by interfering with its physical properties. The device design includes two spiked plates, each with 90 pins. These pins perforate the solid state media of solid state drives destroying all components in the memory chips. Calibration is made on the device to increase the crushing force and power to guarantee optimal data destruction.
Logical data destruction
SSDs have an inbuilt command infrastructure within the firmware to provide for the logical erasure of sensitive data. Data destruction tools and techniques erase data at both the hardware and software level, leaving the SSD devoid of all raw data. An example of a solid state drive sanitizing tool is the ATA Secure Erase. A Secure Erase command on an SSD built-in controller causes the system to reset its storage cells as void, realizing and erasing stored electrons. This process is irreversible and thus guarantees permanent erasure of sensitive data.