Eliminate risk with data erasure

Issue 8 2021 Perimeter Security, Alarms & Intruder Detection

CIOs need to be aware of hard disk drives (HDDs) and solid-state drives (SSDs) lying around data centres and storage rooms, they likely contain sensitive data. Not permanently removing that data in a timely manner, could put the company at risk.


Wale Arewa.

There are various options to destroy the data permanently. Many businesses prefer physically destroying these drives by sending them to a third-party IT asset disposition vendor, or even destroy them in-house. In either case, physical destruction is not the only option for destroying end-of-life data.

Secure data erasure is another option, one that can help companies achieve data sanitisation and at the same time, comply with data protection regulations like PoPIA and GDPR. More importantly, by re-using IT assets, businesses can save the planet in the process. They will also save money they otherwise would have spent on purchasing new storage devices.

Degaussing and shredding may be the cheapest and easiest form of physical destruction, but it’s risky. Degaussing removes data by reducing or eliminating unwanted magnetic fields, but because SSDs don’t store data magnetically, degaussing does not achieve data sanitisation.

Physically shredding SSDs can also be an issue because of shred size. A shred width of 2 mm or smaller is recommended to break through the small memory chips and securely remove the data. Most standard industrial shredders produce much larger fragments, leaving information behind. Physical destruction can also be harmful to the environment by leaving shredded assets behind.

Eliminate risk with data erasure

Data erasure is the software-based method of securely overwriting data from any data storage device using zeros and ones on all sectors of the device. By overwriting the data on the storage device, the data is rendered unrecoverable.

At the end of the erasure process, the data erasure software will verify that data has been successfully overwritten across all sectors of the device. Then, the software will produce a tamper-proof, auditable certificate that the erasure has been successful. At this point, data sanitisation has occurred.

Data erasure can be done on-site or remotely and offers better control than other forms of data sanitisation. The process can also be automated to save time. Blancco Drive Eraser allows businesses to securely erase sensitive data in order to safely resell, re-purpose or dispose of both SSDs and HDDs.

Data erasure is the best way to achieve data sanitisation, due to the validation process to ensure the data was successfully overwritten and having the auditable report readily available. Data erasure also supports environmental initiatives, while allowing companies to retain the resale value of their storage devices.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

How intrusion protection helps secure O&G operations
Surveillance Perimeter Security, Alarms & Intruder Detection Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...
New AI perimeter app package
Dallmeier Electronic Southern Africa Perimeter Security, Alarms & Intruder Detection
With the new AI Perimeter App Package, Dallmeier has extended the application range of its neural AI perimeter network. Previously only available for the Panomera S4 Perimeter camera, this technology is now also available for additional models.

Read more...
JVA 4-line LCD keypad
Perimeter Security, Alarms & Intruder Detection
The JVA 4-line LCD keypad is integral to the JVA Security Electric Fence product range and provides a centralised interface between the customer and their perimeter security solution.

Read more...
Gallagher’s Integrate 360 event in Durban
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security held its Integrate 360 event in Durban, South Africa. The event attracted 65 channel partners, end users, and consultants from across KwaZulu-Natal and broader South Africa to showcase the latest in Gallagher’s technology suite.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Wireless security makes its mark
Perimeter Security, Alarms & Intruder Detection
Alarms have always had a wireless component since the first monitoring control room was launched, but internally, homes and companies used to install cables to connect various sensors and devices to the control panel.

Read more...
Lock it down
OPTEX Perimeter Security, Alarms & Intruder Detection
Securing wide outdoor areas presents several challenges that differ significantly from those faced in smaller, more confined environments, and choosing the right intrusion detection technology is the key to safeguarding these spaces.

Read more...
Smart, reliable detection in any conditions
OPTEX Perimeter Security, Alarms & Intruder Detection
In its discussions with companies operating in South and Southern Africa’s detection and alerting technologies market, SMART Security Solutions spoke to OPTEX for more information on its solutions and technologies.

Read more...
The unseen barrier: AI and perimeter monitoring
Verifier Perimeter Security, Alarms & Intruder Detection Surveillance AI & Data Analytics
Perimeters have been one of the most important security aspects since antiquity, but what does perimeter monitoring look like in the age of AI, CCTV, thermal detection and modern off-site surveillance?

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...