Spring at last: 6 ways to give your electronic devices a spring clean
No sooner has spring arrived and the urge to do our spring clean blossoms; make the floors shine, clean the car, weed the garden… But what about our computers, tablets and smartphones? A regular...
View ArticleOrganisations donating used devices must remove any data beforehand to avoid...
Consumer desire for the latest and greatest communication devices is creating a boom in the recycling business. Charities are also benefiting from the influx of old equipment being donated for reuse in...
View ArticleHDD vs. SSD – Challenges with new technologies [video part 2]
In this video I will be looking at some of the common issues that a user when faces with recovery, erasure and encryption scenarios. Why recoveries are time consuming, what issues does wear levelling...
View ArticleHow to securely erase data from SSDs: 4 questions answered
What are the areas of an SSD where the data is stored? SSDs have four main areas where data is stored: System Area blocks (firmware, etc.) are generally stored in the first few blocks, but can be...
View ArticleSecure data erasure & citizens’ data protection – the EU’s resolutions for 2014
In the world of increasingly digital in which we live, erasing obsolete data stored on media such as hard drives and SSD memory has become a strategic issue in economic and political terms. This has...
View ArticleHow to delete data in a secure environment
Deleting data in a secure environment involves two main concerns: making sure the data has not left the physical place where it is stored, and carrying out the erasure in accordance with strict rules...
View ArticleData for Sale: 80% of Second Hand IT Equipment Dealers have it wrong
You’ve got rid of an old disk drive, computer or mobile phone and you thought all your problems related to your old device disappeared like magic. Well, unfortunately not. All this is not as simple as...
View ArticleDoes privacy matter to IT managers? 4 out of 5 are not aware of impending EU...
More than 80% of IT managers surveyed in Germany, France, Britain and Italy know nothing about the content and impact of the new European Data Protection Regulation, which will be published next year....
View Article5 things you need to know about the Right to be Forgotten
How did the “Right to be Forgotten” come into existence? There have been over 18,000 requests by Britons to remove over 60,000 web links from Google since the ‘right to be forgotten’ was introduced in...
View ArticleData security tops the list for data recovery hot topics from 2014 [video]
Looking back on 2014, the trends that impacted the data recovery industry throughout the year were very clear. We received quite a lot of feedback from our engineers about these trends and how they...
View ArticleSecure data destruction: Why it matters
It can be hard to comprehend the scale of the average company’s data footprint. Not only do firms today have local hard drives and tape backups to contend with, but also mobile devices, memory cards...
View Article3 permanent ways to erase your data
In our last blog, we discussed the importance of being able to securely and permanently erase end-of-life data. Whether you’re working for a company that has legal obligations to destroy customers’...
View ArticleWhat to consider before you redeploy IT equipment
It’s often smarter to redeploy your organisation’s old IT equipment than to throw it away. Say someone hands in their notice a few months after getting their hands on a shiny new company laptop, for...
View ArticleSmartphones and tablets disposal and recycling: How to protect your data on...
In the first part of this article we have highlighted how much information can be found in our smartphones and tablets and the danger of leaving unrestricted access to these data when we decide to sell...
View ArticleSmartphones and tablets disposal and recycling: How to protect your data on...
In the first two parts we showed why it is necessary to erase your personal information on mobile devices. In this last part in this series, we want to give further advice on what to watch out for when...
View ArticleWhen to use data erasure software or a degausser?
Data erasure is a topic hardly to be underestimated by companies when it comes to protecting proprietary or personal data of employees or customers from unauthorised access on behalf of third parties....
View ArticleSelling your old smartphone on eBay: A checklist
Whether or not we choose to line up outside the Apple Store every September for the latest iPhone launch, most of us nowadays replace our smartphones with some regularity. After all, it’s still common...
View ArticleThe importance of managing Return Merchandise Authorisations
Imagine a perfect data centre world where disk drives never failed or needed to be replaced. A world where even if drives came to the end of their useful life they could be simply swapped out and...
View ArticleSecure Deletion of LUNs of Active High-End Storage Systems Part 1/3
The fact that data erasure is of immense importance for a company’s security has already been explained in several articles here on this blog. No matter whether it is a desktop computer, a manager...
View ArticleSecure Deletion Of LUNs Of Active High-End Storage Systems Part 2/3
Scrapped, defective or outdated hard drives can be a special source of danger for companies. Because in many high-end systems stored data are not only distributed over many hard drives, but often also...
View Article
More Pages to Explore .....