Computers Don't Lose Their Memory With Age

Tuesday, December 8, 2009

What is certain is that confidential data is stored on computers - PCs, laptops, which is eventually discarded or used for any other purpose.

This means that all too often used computers to a backdoor means to gain unauthorized access to confidential information.

It is important to go the extra mile and confidential information at the disposal of old computer systems, not to destroy it fall into the wrong hands.

Data is a muchlike DNA, you can be inherited, it can be amended. In general, the computer may contain confidential material, such as records, accounts, photographs and images. To a data recovery expert they are nothing more than "zeros" and "where" organized on the hard drive of your computer, and this information is much easier to get than you might think.

While computers are a number of reasons, such as upgrading models or a lease expires discarded, all too often we haveForget about thinking what information is on the computers that contain memory. Often old computers are donated charity auction, or sold to the general public, but what about the data stored in it?

Whether individually or rejected en masse, it is possible that these computers still contain protected health information. Much of the data stored on the disk are trivial information and software applications, but te fact that many computers arediscarded with sensitive data continues to be the on to the disks.

Lost, but not irretrievably

Despite significant damage caused by natural disasters, equipment failure, human error or security breaches, data on computers is very resilient. Often, data is probably lost for ever, data can be retrieved, recovery specialists. Likewise, it is assumed that the data be deleted from the system often is discarded on aComputer hard drive.

For an expert who comes into possession of a previously used computer system, there are a number of methods and techniques that are used to reconstruct data even after the disk has been erased. To permanently remove the data, it is necessary to go via the simple deletion of a file from your desktop.

What many users do not realize that when you delete a file, the contents are not actually removed: the file, at least inIn the short term is still on the disk, but is no longer connected to the system. Simply deleting a file are only references to the directory, while maintaining the data remains on disk until the operating system once the sectors used to write new data.

Even reformatting or repartitioning a hard drive does not guarantee files are completely gone. Until the old data is actually overwritten by new information, it can be recovered by programs that readDisk sectors directly, such as forensic software, commercially available data retrieval software or data recovery techniques.

The good news is there are a number of simple methods that are used to ensure the ultimate destruction of data on disk and can protect against disclosure of sensitive information. These methods are: degaussing, overwriting, data encryption and media destruction, discussed in more detail below below.

Wiping

Wiping sensitive data from a removable disk or computer hard drive is the best method for data destruction can ensure the data can not be reconstructed via laboratory techniques.

Wiping is essential when hardware containing sensitive data over a secure way to move a non-secure environment. Software-based Data destruction methods are inexpensive, easy to use and readily available on the market from aNumber of vendors.
Degaussing

A stricter approach to data erasure is degaussing, a process in which a computer magnetic 'media is erased.

This often results in making hard drives unusable and can prevent recycled computers for educational use, donation or resale to the general public. This method is not for the faint hearted and is best used only in the case of highly sensitive, proprietary data, with very serious consequencesif leaked.

Clearing

A less extreme means of data erasure is the removal of data that can be proportional to the level of sensitivity, to ensure the data can not be reconstructed using normal system functions.

This method is especially useful when the disk is used in the same computer or in the office again. For example, if someone is dressed a computer for new acquisition of retiring staff, allowing the media to stayin the same controlled environment. Clearing is achieved by overwriting the system-assigned space on the hard drive. A single overwrite of a file or all of the storage system is usually enough to ensure that previous information is not rebuilt.

Ultimate Destruction

In extreme cases, which must be ensured in the destruction of data and the possibility of retrieval completely eliminated, physical destruction of hardware is the best option.
Media can effectivelydestroyed a number of methods: an abrasive on a magnetic disk or drum recording surface will do the trick, while caustic chemicals can have the same effect. ) Destruction of a hard drive (or an entire computer in this case can also be achieved by disintegration or incineration at a facility for the destruction of metal. Regardless of which technique you use, it is important to remember that the entire recording surface must be completely removed before disposal. Even if you decide tocompletely destroy the hardware, it is still a good idea to clean up before the media here - better safe than sorry!

Hold on a second!

While ensuring that sensitive data should not fall into the wrong hands, the highest priority, it is important to ensure that data is no longer needed before you delete it, forever.

Prior to disposal of computer hardware, you need a backup copy of data at a secure location. Just because the computeris no longer needed, does not mean the data is also not required. It could also be legal requirements for obtaining certain information.

Protection of proprietary data is of crucial importance and properly remove sensitive information from computer hard drives should be integrated into corporate policy to protect themselves.



0 comments: