Are you sure you wiped your hard drive properly?

1 October 2019 Information Security, Security Services & Risk Management

Have you ever seen a hacker movie? When the other shoe drops, you can see the black hat scrambling for their computer, tearing out the hard drive and trying to erase them. They may even run neodymium magnets over them and then finish the job by driving an electric drill directly through the platters of the drives. Alternatively, they just smash it with a hammer and hope for the best, says Carey van Vlaanderen, CEO at ESET South Africa.


Carey van Vlaanderen, CEO at ESET South Africa.

Rest assured, you really do not have to go about smashing your hard drives left and right, but you should always ensure the security and privacy of your data under all circumstances – a point made even clearer by a recent study.

Commissioned by Comparitech and conducted by the University of Hertfordshire, the study sought to find out how thorough we are when it comes to wiping our hard drives before we sell them. Turns out, many of us are not very thorough. Or at all.

The researchers performed a series of tests on a sample of 200 second-hand hard drives that had been bought off online marketplaces and various merchants. They found almost 60% of these hard drives still contained some information stored on them by the former owners.

The leftover information included sensitive data that could be exploited by bad actors. The data ranged from official documents such as scans of passports and driver licenses, through bank statements and tax documents to visa applications and even photos of an intimate nature. The list of documents uncovered on these hard drives is much more varied, but this is just to illustrate how much sensitive data you may store on your hard drives, and without giving it much thought.

On the other hand, although it may look like the owners are indifferent towards securing their data, the study shows otherwise. The former owners did try to wipe their data, they just failed to do so securely. Only 26% of the drives were wiped properly and no data could be recovered from them, while another 16% were not accessible and could not be read. As for the rest, the data could be recovered with varying degrees of difficulty.

Worryingly, one in six people made no attempt whatsoever to wipe the data.

A similar study was conducted in 2007. Back then, the amount of recoverable data from second-hand HDDs was significantly lower. What’s more, in the older study a considerable number of the drives ended up being unreadable. Observing the rising trend of data being easily recoverable from second-hand drives, sellers should be more careful.

You can always take preventative measures, with the simplest being encrypting your hard drive so you can rest easy if you ever lose it. When it comes to wiping the hard drive you want to sell, you can check the website of your hard drive’s manufacturer, that should contain tools to help you manage the wiping process properly. Before you proceed, however, make sure you have backed up all the data you want to keep.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...