Go to Top

Tag Archives

Tag Archives: data erasure software

Choosing an IT Asset Disposal Provider

The European Union (EU) has introduced the General Data Protection Regulation (GDPR) set to be enforced on May 25, 2018.  This regulation replaces the Data Protection Directive 95/46/EC.  How will GDPR directly impact the United States?  In the past, U.S.-based regulations were a primary driver of compliance requirements.  This is changing with the introduction of the GDPR.  The GDPR requires organizations to understand what information they have, who has access …Read More

Live Server Erasure – How to Erase Data From a Running Server

Securely erasing data is definitely not an easy task. Whether it’s a single hard disk drive or a SSD in a laptop or many enterprise class storage devices inside a live server – just pressing the delete button on the keyboard just won´t cut it. As we have pointed out in previous blog posts, using the “Recycle Bin” and deleting a file is not enough. The same is true with …Read More

Secure Data Erasure Management with Hosted Erase

Revelations of data leaks are now part of the daily business news.  Whether large Internet providers or telecommunications companies or the customer database of a global player are affected – the statistics show alarming figures regarding the frequency and success of cyber attacks and attacks on sensitive information from illegal data collectors.  This increases the pressure on large corporations and companies that are obligated to protect and prevent their electronic …Read More

Data Deletion Methods Are Not All Equal

Not all attempts at data deletion are successful. We recently released a study with our trusted erasure software partner Blancco Technology Group where we purchased 122 pieces of second-hand equipment (mobile devices and drives) randomly selected from Amazon, eBay and Gazelle. On a total of 48 percent of the media purchased, residual data could still be retrieved. The small selection of mobile devices housed thousands of files (emails, call logs, text/SMS/IMs, …Read More