Data centers

11:13 PM
Art Wittmann
Art Wittmann
Connect Directly
Repost This

Disposing of data: Hammer vs Software

One of the most effective tools in preventing the data stored in depreciated systems from being stolen is probably in your shed or basement right now.

It's predictable like the change of the seasons. Every year systems come off lease or are fully depreciated and its time dump the old and bring in the new. But just how careful are you about erasing data from old systems? Recently in a press release, Forensics vendor Kroll Ontrack said that it bought five enterprise owned used systems on EBay just to see how much data it could recover. The company says it retrieved about 60% of what had been stored on those systems.

I have to admit to worrying about this a couple years ago when my personal desktop gave up the ghost. I had TurboTax documents on it and probably a bunch of other stuff I didn't want anyone to see (ok, I definitely did). My solution was to open up the system, remove the hard drive and then beat the drive to a pulp with a hammer. Neanderthalic, but effective - and oddly cathartic.

It's probably not reasonable to flatten every hard drive you retire from your enterprise - though I highly recommend leveling a few yourself. There's plenty of software out there that will wipe the drive and then write and rewrite bit patterns until you tell it to stop. Simply hitting the delete key is certainly not enough, and the more sensitive the data the more you should make sure that even the forensics folks can't read the drive. They're not all white hats.

Now this notion of seeing what you can find on used systems sold on eBay is another matter - of course no one reading this blog would troll for credit card numbers or other personal information, but maybe Rush Limbaugh could pony up a few mil for anyone who can find his old Oxycontin prescriptions... It's all good clean fun.

Comment  | 
Print  | 
More Insights
More Blogs from Commentary
SDN: Waiting For The Trickle-Down Effect
Like server virtualization and 10 Gigabit Ethernet, SDN will eventually become a technology that small and midsized enterprises can use. But it's going to require some new packaging.
IT Certification Exam Success In 4 Steps
There are no shortcuts to obtaining passing scores, but focusing on key fundamentals of proper study and preparation will help you master the art of certification.
VMware's VSAN Benchmarks: Under The Hood
VMware touted flashy numbers in recently published performance benchmarks, but a closer examination of its VSAN testing shows why customers shouldn't expect the same results with their real-world applications.
Building an Information Security Policy Part 4: Addresses and Identifiers
Proper traffic identification through techniques such as IP addressing and VLANs are the foundation of a secure network.
SDN Strategies Part 4: Big Switch, Avaya, IBM,VMware
This series on SDN products concludes with a look at Big Switch's updated SDN strategy, VMware NSX, IBM's hybrid approach, and Avaya's focus on virtual network services.
Hot Topics
Converged Infrastructure: 3 Considerations
Bill Kleyman, National Director of Strategy & Innovation, MTM Technologies,  4/16/2014
Heartbleed's Network Effect
Kelly Jackson Higgins, Senior Editor, Dark Reading,  4/16/2014
White Papers
Register for Network Computing Newsletters
Current Issue
Twitter Feed