Spring at last: 6 ways to give your electronic devices a spring clean
No sooner has spring arrived and the urge to do our spring clean blossoms; make the floors shine, clean the car, weed the garden… But what about our computers, tablets and smartphones? A regular...
View ArticleOrganisations donating used devices must remove any data beforehand to avoid...
Consumer desire for the latest and greatest communication devices is creating a boom in the recycling business. Charities are also benefiting from the influx of old equipment being donated for reuse in...
View ArticleHDD vs. SSD – Challenges with new technologies [video part 2]
In this video I will be looking at some of the common issues that a user when faces with recovery, erasure and encryption scenarios. Why recoveries are time consuming, what issues does wear levelling...
View ArticleHow to securely erase data from SSDs: 4 questions answered
What are the areas of an SSD where the data is stored? SSDs have four main areas where data is stored: System Area blocks (firmware, etc.) are generally stored in the first few blocks, but can be...
View ArticleSecure data erasure & citizens’ data protection – the EU’s resolutions for 2014
In the world of increasingly digital in which we live, erasing obsolete data stored on media such as hard drives and SSD memory has become a strategic issue in economic and political terms. This has...
View ArticleHow to delete data in a secure environment
Deleting data in a secure environment involves two main concerns: making sure the data has not left the physical place where it is stored, and carrying out the erasure in accordance with strict rules...
View ArticleData for Sale: 80% of Second Hand IT Equipment Dealers have it wrong
You’ve got rid of an old disk drive, computer or mobile phone and you thought all your problems related to your old device disappeared like magic. Well, unfortunately not. All this is not as simple as...
View ArticleDoes privacy matter to IT managers? 4 out of 5 are not aware of impending EU...
More than 80% of IT managers surveyed in Germany, France, Britain and Italy know nothing about the content and impact of the new European Data Protection Regulation, which will be published next year....
View Article5 things you need to know about the Right to be Forgotten
How did the “Right to be Forgotten” come into existence? There have been over 18,000 requests by Britons to remove over 60,000 web links from Google since the ‘right to be forgotten’ was introduced in...
View ArticleData security tops the list for data recovery hot topics from 2014 [video]
Looking back on 2014, the trends that impacted the data recovery industry throughout the year were very clear. We received quite a lot of feedback from our engineers about these trends and how they...
View ArticleSecure data destruction: Why it matters
It can be hard to comprehend the scale of the average company’s data footprint. Not only do firms today have local hard drives and tape backups to contend with, but also mobile devices, memory cards...
View Article3 permanent ways to erase your data
In our last blog, we discussed the importance of being able to securely and permanently erase end-of-life data. Whether you’re working for a company that has legal obligations to destroy customers’...
View ArticleWhat to consider before you redeploy IT equipment
It’s often smarter to redeploy your organisation’s old IT equipment than to throw it away. Say someone hands in their notice a few months after getting their hands on a shiny new company laptop, for...
View ArticleSmartphones and tablets disposal and recycling: How to protect your data on...
In the first part of this article we have highlighted how much information can be found in our smartphones and tablets and the danger of leaving unrestricted access to these data when we decide to sell...
View ArticleSmartphones and tablets disposal and recycling: How to protect your data on...
In the first two parts we showed why it is necessary to erase your personal information on mobile devices. In this last part in this series, we want to give further advice on what to watch out for when...
View ArticleWhen to use data erasure software or a degausser?
Data erasure is a topic hardly to be underestimated by companies when it comes to protecting proprietary or personal data of employees or customers from unauthorised access on behalf of third parties....
View ArticleSelling your old smartphone on eBay: A checklist
Whether or not we choose to line up outside the Apple Store every September for the latest iPhone launch, most of us nowadays replace our smartphones with some regularity. After all, it’s still common...
View ArticleThe importance of managing Return Merchandise Authorisations
Imagine a perfect data centre world where disk drives never failed or needed to be replaced. A world where even if drives came to the end of their useful life they could be simply swapped out and...
View ArticleSecure Deletion of LUNs of Active High-End Storage Systems Part 1/3
The fact that data erasure is of immense importance for a company’s security has already been explained in several articles here on this blog. No matter whether it is a desktop computer, a manager...
View ArticleSecure Deletion Of LUNs Of Active High-End Storage Systems Part 2/3
Scrapped, defective or outdated hard drives can be a special source of danger for companies. Because in many high-end systems stored data are not only distributed over many hard drives, but often also...
View ArticleSecure Deletion Of LUNs Of Active High-End Storage Systems Part 3/3
In the last two articles, we discussed the two most common scenarios leading to LUN erasure: securely erasing a LUN, so that the volume can be used again and erasing LUNs on one or more defective or...
View ArticleThe top 10 worst data disasters from 2015
Our engineering team loves a good story about data disasters, especially when we can recover our customers’ information for them in extreme circumstances. For the last 13 years, we have collected and...
View ArticleAgent 001 leaves no trace
“Paranoia’s the garlic in life’s kitchen; you can never have too much.” – T. Pynchon The amount of electronic information out there is overwhelming. You might think that your data is a safe needle in...
View ArticleWhat is the black market value of your data?
In 2008 two big banks — The Royal Bank of Scotland (RBS) and NatWest — experienced a massive security breach. When an employee sold an old company computer on eBay, private data of over a million...
View ArticleA rabbit hole full of data. And in it – a mole
Remember Alice in Wonderland? For most of us, the world of data is a wonderland — we don’t care how it works, we just want it to work. But I’m here to take you all the way down the rabbit hole of...
View ArticleDestroying data: mission impossible
Data recovery experts often have to deal with cases where important data has been deleted — by accident or on purpose — by its owner or a third party. Those stories don’t always end the same but more...
View ArticleSlack space, or the devil is in the details
When I told you in my previous email that the only way to successfully erase a file is to COMPLETELY overwrite it, I wasn’t just trying to be dramatic. A few months ago, my friend had mistakenly...
View ArticleNo data, no cry
Things used to be much easier back in the old days. When Cold War spies smuggled secrets, they could rest easy knowing that in case of an emergency, the information could be fairly easily destroyed....
View ArticleWho would James Bond be without his toys?
Total and unrecoverable annihilation of data isn’t easy these days, as the GCHQ agents who supervised the drilling through The Guardian’s hard drives knew all too well. The hard drives contained data...
View ArticleAre you the target?
Do you know the basic principle of hunting? Always be vigilant — otherwise you could become the prey! The world of data is a jungle — you could do a lot of hunting, but you could just as easily get...
View ArticleAre you ready for your mission? [quiz]
Time limit: 0 Quiz-summary 0 of 8 questions completed Questions: 1 2 3 4 5 6 7 8 Information So far you’ve done well. You know why erasure is important, how to delete data and where it can hide when...
View ArticleEU legislation adds pressure on companies to erase data
The impact of the Snowden scandal has only added to the need for the EU to increase the minimum security expectations for companies’ networks and personal data protection. The big problem is finding a...
View ArticleHow to prevent EU penalties for not deleting data
No room for complacency Thanks to the new GDPR regulation, everyone from third-party erasure companies to IT staff will be legally obliged to securely erase data when the company is doing business...
View ArticleWhy you should erase virtual data
In this post we’ll analyse why it’s necessary to properly erase data in virtual systems and what legislation is in place to support this.Read More
View ArticleWhat is ‘virtualisation sprawl’ and how do you stop it?
Find out what ‘virtualisation sprawl’ is and how you can take steps to prevent it from happening.Read More
View ArticleHow to spring clean your devices properly
If your devices need a spring clean, what’s the best way of approaching this? Find out how to clean up your devices properly and without losing data.Read More
View ArticleHow to erase live server data, without wiping the whole system
Securely erasing data on a live server is far more complicated than just pressing delete or format. Find out how to do it properly in this article.Read More
View Article