Eliminate risk with data erasure

Issue 8 2021 Perimeter Security, Alarms & Intruder Detection

CIOs need to be aware of hard disk drives (HDDs) and solid-state drives (SSDs) lying around data centres and storage rooms, they likely contain sensitive data. Not permanently removing that data in a timely manner, could put the company at risk.

Wale Arewa.

There are various options to destroy the data permanently. Many businesses prefer physically destroying these drives by sending them to a third-party IT asset disposition vendor, or even destroy them in-house. In either case, physical destruction is not the only option for destroying end-of-life data.

Secure data erasure is another option, one that can help companies achieve data sanitisation and at the same time, comply with data protection regulations like PoPIA and GDPR. More importantly, by re-using IT assets, businesses can save the planet in the process. They will also save money they otherwise would have spent on purchasing new storage devices.

Degaussing and shredding may be the cheapest and easiest form of physical destruction, but it’s risky. Degaussing removes data by reducing or eliminating unwanted magnetic fields, but because SSDs don’t store data magnetically, degaussing does not achieve data sanitisation.

Physically shredding SSDs can also be an issue because of shred size. A shred width of 2 mm or smaller is recommended to break through the small memory chips and securely remove the data. Most standard industrial shredders produce much larger fragments, leaving information behind. Physical destruction can also be harmful to the environment by leaving shredded assets behind.

Eliminate risk with data erasure

Data erasure is the software-based method of securely overwriting data from any data storage device using zeros and ones on all sectors of the device. By overwriting the data on the storage device, the data is rendered unrecoverable.

At the end of the erasure process, the data erasure software will verify that data has been successfully overwritten across all sectors of the device. Then, the software will produce a tamper-proof, auditable certificate that the erasure has been successful. At this point, data sanitisation has occurred.

Data erasure can be done on-site or remotely and offers better control than other forms of data sanitisation. The process can also be automated to save time. Blancco Drive Eraser allows businesses to securely erase sensitive data in order to safely resell, re-purpose or dispose of both SSDs and HDDs.

Data erasure is the best way to achieve data sanitisation, due to the validation process to ensure the data was successfully overwritten and having the auditable report readily available. Data erasure also supports environmental initiatives, while allowing companies to retain the resale value of their storage devices.

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Sensing technology powered by NVIDIA
Perimeter Security, Alarms & Intruder Detection
Fotech raises customer confidence and increases accuracy of sensing technology powered by NVIDIA Jetson edge AI platform and TensorRT software.

Electric gate safety principles
Regal Distributors SA Perimeter Security, Alarms & Intruder Detection
Regal Security Distributors offers advice its customers have shared over the years when it comes to maintaining electronic gates.

D-TECT 60 external motion detector
Perimeter Security, Alarms & Intruder Detection
New wired detector, which delivers precise and reliable presence detection, furthering GJD’s aim to provide reliable human detection systems and intelligent deterrent solutions for the global security market.

Perimeter and fire protection
Hikvision South Africa CCTV, Surveillance & Remote Monitoring Fire & Safety Perimeter Security, Alarms & Intruder Detection
Hikvision’s HeatPro is a new series of thermal cameras designed to provide affordable all-weather deterrent and alerts, aimed at perimeter protection and fire prevention applications.

EZVIZ cameras deliver with Ajax
Regal Distributors SA Perimeter Security, Alarms & Intruder Detection
Combined with the Ajax app, EZVIZ cameras give a clear, live view of everything happening in and around the property and are accessible any time, from anywhere.

Ajax Systems partners with Fidelity ADT
Ajax Systems Perimeter Security, Alarms & Intruder Detection News
Ajax Systems has united efforts with Fidelity ADT to provide residential and commercial users with access to innovative security, technology and software.

Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Perimeter Security, Alarms & Intruder Detection CCTV, Surveillance & Remote Monitoring Residential Estate (Industry)
Hi-Tech Security Solutions asks two industry leading companies how surveillance technologies can extend and enhance the perimeter security of a residential estate?

Elements of perimeter security
Gallagher Dahua Technology South Africa Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions Residential Estate (Industry)
Hi-Tech Security Solutions looks at some of the elements that make up a complete and integrated security solution for residential estate perimeters.

Thermal camera for perimeter intrusion detection
Dahua Technology South Africa Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) Products
Thermal imaging provides an all-weather perimeter solution featuring image visualisation, recordable, accurate warning, fewer false alarms and low deployment cost, making it an ideal choice for short-range perimeter.

Perimeter security planning
XtraVision Residential Estate (Industry) Perimeter Security, Alarms & Intruder Detection
Nick Grange, MD of XtraVision, provides insight into the design aspects and technology solutions to effectively ensure your estate’s perimeter is secure.