Quantcast
Channel: data erasure – The Kroll Ontrack UK Blog
Browsing latest articles
Browse All 37 View Live

Spring at last: 6 ways to give your electronic devices a spring clean

No sooner has spring arrived and the urge to do our spring clean blossoms; make the floors shine, clean the car, weed the garden… But what about our computers, tablets and smartphones? A regular...

View Article



Organisations donating used devices must remove any data beforehand to avoid...

Consumer desire for the latest and greatest communication devices is creating a boom in the recycling business. Charities are also benefiting from the influx of old equipment being donated for reuse in...

View Article

HDD vs. SSD – Challenges with new technologies [video part 2]

In this video I will be looking at some of the common issues that a user when faces with recovery, erasure and encryption scenarios. Why recoveries are time consuming, what issues does wear levelling...

View Article

How to securely erase data from SSDs: 4 questions answered

What are the areas of an SSD where the data is stored? SSDs have four main areas where data is stored: System Area blocks (firmware, etc.) are generally stored in the first few blocks, but can be...

View Article

Secure data erasure & citizens’ data protection – the EU’s resolutions for 2014

In the world of increasingly digital in which we live, erasing obsolete data stored on media such as hard drives and SSD memory has become a strategic issue in economic and political terms. This has...

View Article


How to delete data in a secure environment

Deleting data in a secure environment involves two main concerns: making sure the data has not left the physical place where it is stored, and carrying out the erasure in accordance with strict rules...

View Article

Data for Sale: 80% of Second Hand IT Equipment Dealers have it wrong

You’ve got rid of an old disk drive, computer or mobile phone and you thought all your problems related to your old device disappeared like magic. Well, unfortunately not. All this is not as simple as...

View Article

Image may be NSFW.
Clik here to view.

Does privacy matter to IT managers? 4 out of 5 are not aware of impending EU...

More than 80% of IT managers surveyed in Germany, France, Britain and Italy know nothing about the content and impact of the new European Data Protection Regulation, which will be published next year....

View Article


Image may be NSFW.
Clik here to view.

5 things you need to know about the Right to be Forgotten

How did the “Right to be Forgotten” come into existence? There have been over 18,000 requests by Britons to remove over 60,000 web links from Google since the ‘right to be forgotten’ was introduced in...

View Article


Data security tops the list for data recovery hot topics from 2014 [video]

Looking back on 2014, the trends that impacted the data recovery industry throughout the year were very clear. We received quite a lot of feedback from our engineers about these trends and how they...

View Article

Image may be NSFW.
Clik here to view.

Secure data destruction: Why it matters

It can be hard to comprehend the scale of the average company’s data footprint. Not only do firms today have local hard drives and tape backups to contend with, but also mobile devices, memory cards...

View Article

Image may be NSFW.
Clik here to view.

3 permanent ways to erase your data

In our last blog, we discussed the importance of being able to securely and permanently erase end-of-life data. Whether you’re working for a company that has legal obligations to destroy customers’...

View Article

Image may be NSFW.
Clik here to view.

What to consider before you redeploy IT equipment

It’s often smarter to redeploy your organisation’s old IT equipment than to throw it away. Say someone hands in their notice a few months after getting their hands on a shiny new company laptop, for...

View Article


Image may be NSFW.
Clik here to view.

Smartphones and tablets disposal and recycling: How to protect your data on...

In the first part of this article we have highlighted how much information can be found in our smartphones and tablets and the danger of leaving unrestricted access to these data when we decide to sell...

View Article

Image may be NSFW.
Clik here to view.

Smartphones and tablets disposal and recycling: How to protect your data on...

In the first two parts we showed why it is necessary to erase your personal information on mobile devices. In this last part in this series, we want to give further advice on what to watch out for when...

View Article


Image may be NSFW.
Clik here to view.

When to use data erasure software or a degausser?

Data erasure is a topic hardly to be underestimated by companies when it comes to protecting proprietary or personal data of employees or customers from unauthorised access on behalf of third parties....

View Article

Image may be NSFW.
Clik here to view.

Selling your old smartphone on eBay: A checklist

Whether or not we choose to line up outside the Apple Store every September for the latest iPhone launch, most of us nowadays replace our smartphones with some regularity. After all, it’s still common...

View Article


Image may be NSFW.
Clik here to view.

The importance of managing Return Merchandise Authorisations

Imagine a perfect data centre world where disk drives never failed or needed to be replaced.  A world where even if drives came to the end of their useful life they could be simply swapped out and...

View Article

Image may be NSFW.
Clik here to view.

Secure Deletion of LUNs of Active High-End Storage Systems Part 1/3

The fact that data erasure is of immense importance for a company’s security has already been explained in several articles here on this blog. No matter whether it is a desktop computer, a manager...

View Article

Image may be NSFW.
Clik here to view.

Secure Deletion Of LUNs Of Active High-End Storage Systems Part 2/3

Scrapped, defective or outdated hard drives can be a special source of danger for companies. Because in many high-end systems stored data are not only distributed over many hard drives, but often also...

View Article

Image may be NSFW.
Clik here to view.

Secure Deletion Of LUNs Of Active High-End Storage Systems Part 3/3

In the last two articles, we discussed the two most common scenarios leading to LUN erasure: securely erasing a LUN, so that the volume can be used again and erasing LUNs on one or more defective or...

View Article


The top 10 worst data disasters from 2015

Our engineering team loves a good story about data disasters, especially when we can recover our customers’ information for them in extreme circumstances. For the last 13 years, we have collected and...

View Article


Image may be NSFW.
Clik here to view.

Agent 001 leaves no trace

“Paranoia’s the garlic in life’s kitchen; you can never have too much.” – T. Pynchon The amount of electronic information out there is overwhelming. You might think that your data is a safe needle in...

View Article

Image may be NSFW.
Clik here to view.

What is the black market value of your data?

In 2008 two big banks — The Royal Bank of Scotland (RBS) and NatWest — experienced a massive security breach. When an employee sold an old company computer on eBay, private data of over a million...

View Article

Image may be NSFW.
Clik here to view.

A rabbit hole full of data. And in it – a mole

Remember Alice in Wonderland? For most of us, the world of data is a wonderland — we don’t care how it works, we just want it to work. But I’m here to take you all the way down the rabbit hole of...

View Article


Image may be NSFW.
Clik here to view.

Destroying data: mission impossible

Data recovery experts often have to deal with cases where important data has been deleted — by accident or on purpose — by its owner or a third party. Those stories don’t always end the same but more...

View Article

Image may be NSFW.
Clik here to view.

Slack space, or the devil is in the details

When I told you in my previous email that the only way to successfully erase a file is to COMPLETELY overwrite it, I wasn’t just trying to be dramatic. A few months ago, my friend had mistakenly...

View Article

Image may be NSFW.
Clik here to view.

No data, no cry

Things used to be much easier back in the old days. When Cold War spies smuggled secrets, they could rest easy knowing that in case of an emergency, the information could be fairly easily destroyed....

View Article

Image may be NSFW.
Clik here to view.

Who would James Bond be without his toys?

Total and unrecoverable annihilation of data isn’t easy these days, as the GCHQ agents who supervised the drilling through The Guardian’s hard drives knew all too well. The hard drives contained data...

View Article



Image may be NSFW.
Clik here to view.

Are you the target?

Do you know the basic principle of hunting? Always be vigilant — otherwise you could become the prey! The world of data is a jungle — you could do a lot of hunting, but you could just as easily get...

View Article

Image may be NSFW.
Clik here to view.

Are you ready for your mission? [quiz]

Time limit: 0 Quiz-summary 0 of 8 questions completed Questions: 1 2 3 4 5 6 7 8 Information So far you’ve done well. You know why erasure is important, how to delete data and where it can hide when...

View Article

Image may be NSFW.
Clik here to view.

EU legislation adds pressure on companies to erase data

The impact of the Snowden scandal has only added to the need for the EU to increase the minimum security expectations for companies’ networks and personal data protection. The big problem is finding a...

View Article

Image may be NSFW.
Clik here to view.

How to prevent EU penalties for not deleting data

No room for complacency Thanks to the new GDPR regulation, everyone from third-party erasure companies to IT staff will be legally obliged to securely erase data when the company is doing business...

View Article


Image may be NSFW.
Clik here to view.

Why you should erase virtual data

In this post we’ll analyse why it’s necessary to properly erase data in virtual systems and what legislation is in place to support this.Read More

View Article

Image may be NSFW.
Clik here to view.

What is ‘virtualisation sprawl’ and how do you stop it?

Find out what ‘virtualisation sprawl’ is and how you can take steps to prevent it from happening.Read More

View Article

Image may be NSFW.
Clik here to view.

How to spring clean your devices properly

If your devices need a spring clean, what’s the best way of approaching this? Find out how to clean up your devices properly and without losing data.Read More

View Article


Image may be NSFW.
Clik here to view.

How to erase live server data, without wiping the whole system

Securely erasing data on a live server is far more complicated than just pressing delete or format. Find out how to do it properly in this article.Read More

View Article

Browsing latest articles
Browse All 37 View Live


Latest Images