Technological advances and a false sense of security and trust that personal information and corporate secrets are safe.
No matter where you travel on the internet, you can give hackers the ability to access your information easily.
Someone can compromise your information a lot of different ways, from viruses and Trojans that are inserted into emails and downloaded on to your computer to a direct attack through an internet connection. Cloud storage services protect your data from some of these risks through encryption, but your information is vulnerable even after you erase it- and even after throw it away.
There’s a significant difference between erasing your hard drive and ensuring that your information is deleted permanently. As technology has increased, the ability to recover data has followed suit, and although the word ‘erased’ seems pretty permanent in most situations, in the computer world, the better word to use is obliterate.
So how do you obliterate your data? The best bet is to degauss your hard drive, and then destroy it.
In the paper Secure Deletion of Data from Magnetic and Solid-State Memory, Mr. Gutmann discusses several ways that hackers can recover your data from an ‘erased’ hard drive or random access memory, and how just overwriting the data in an ineffective way to securely delete the information you have on your computer.
Click here to read the entire paper published from the Department of Computer Science at the University of Auckland.
If you’re getting a new computer or retiring an old one for your business, Shred Nations is here to help you destroy the data on your old hard drives. To get started, fill out the form to the right, or give us a call at (800) 747-3365.