Why Hasn’t Someone Made a Rack Mountable Hard Disk Crusher?

“I am thankful the most important key in history was invented. It’s not the key to your house, your car, your boat, your safety deposit box, your bike lock or your private community. It’s the key to order, sanity, and peace of mind. The key is ‘Delete.’                

                 -Elayne Boosler


Security: Corporations and small businesses have finally embraced the idea of a written security policy; however, many of these policies still do not account for the destruction of hardware that is no longer functional or compatible. Yes, a typical IT support person will make sure a flash drive, SSD, or mechanical hard drive has at least had its indexes deleted (almost useless), or taken the next step to write zeroes over the entire drive (better), but few will take the steps necessary to truly secure that sensitive data—complete drive destruction.

Donating used drives is a noble idea, but there is great risk involved. Hackers have long known that used hard drives are a treasure trove of information. Usually, data is left intact by the previous user, but even when it has been deleted, it is easily retrieved, and while writing random information over a hard drive is effective, in must be done several times to keep the motivated attacker away from the data, and that takes time, and a functioning drive of course.

Flash Technology: The need for speed has led to the general use of flash technologies, even for sensitive data. Solid State Drives (SSD), and typical USB thumb drives, are ubiquitous in the business world, but present the security professional with a new challenge; flash memory chips fail, and drives contain buffers for this reason. One component of‘wear leveling’ technology is that the disks controller will ‘turn off’ any sectors deemed defective and transfer the data to a new sector—this leaves the data on the old sector—and now your attempt to write over that data will fail.

Perceived Ease-of-Use: “The degree to which a person believes that using a particular system would be free from effort.” PEOU is axiomatic, from washing machines to sports cars; PEOU is truly a barrier to any system’s adoption. Even when presented with the facts about used data-storage destruction, decision makers will opt for the easier path—not the more secure one.

Phiston understands that technology needs to be safe and easy to use or people just won’t use it. As a result, they have developed a rack mountable hard disk drive destroyer; theMediaVise® Rackmount HDD Destroyer puts the power of a 20-ton hard disk crusher right in your rack so that secure data destruction is easier than ever. Clean, secure, and shielded from RFI and EMI, the MVR-HDD is at home in any data center, large or small.

Get serious about data destruction and contact Phiston today. For the latest news in data destruction and MediaVise products, follow @PhistonOfficial, and to join in the conversation, find Phiston on Facebook.

Leave a Reply

Your email address will not be published. Required fields are marked *