Data erasure, and data security, now is not the time to cut corners

data erasure

Philip Bridge, President at Ontrack, reflects on the work-from-home situation that many of us now face and reinforces the importance of data erasure services as businesses adapt to the new norm.

A new normal


Homeworking has become the new normal for many of us during the current pandemic. It doesn’t look like it is going to change anytime soon either. Google and Facebook have told their staff they can work from home for the rest of 2020. Twitter has gone a step further and is allowing staff to work from home “forever” if they wish. It has been a sea change, with many workers reluctant to return to the office even when it is deemed safe to do so. Because of this, 82 per cent of UK businesses have admitted they are considering changing future working practices to allow more staff to work from home even after lockdown ends.

Offices are lying vacant up and down the land. In them, hundreds of thousands of computers and other expensive ICT equipment has been left unused and gathering dust. With no end in sight to the enforced lockdown for many countries, cash-strapped businesses are looking to recoup some of the valuable capital expenditure and offload this equipment quickly. However, in their rush to do so, many are skipping effective data erasure techniques.

Unfathomable quantities


Data is core to the digitally transformed world in which we live. Data now exists in unfathomable quantities. In 2018, the global volume of data was a ‘mere’ 33 zettabytes (ZB). By 2025, IDC predicts that number will balloon to 175 ZB. Data is undoubtedly valuable, but it can be dangerous too. Leaving sensitive data on drives could cause untold reputational damage, as well as be in breach of increasingly stringent regulations. Not least of which the General Data Protection Regulation (GDPR) that came into force in 2018, where the financial penalties are significant: a fine of up to €20m or 4% of annual turnover (whichever is greater). 

A common misunderstanding


Keeping sensitive data safe and secure should be a priority for any business. However, this is not always the case. Research Ontrack undertook alongside Blancco Technology Group last year showed that 42% of drives being sold online had not been completely purged of the sensitive company data that resides on them. These included drives from major universities, government software developers and large travel companies. 

Often it is a misunderstanding of what constitutes an effective data destruction method. Every seller we purchased drives from insisted that proper data sanitisation methods had been performed so that no data was left behind. Yet, for almost half, this was not the case. This demonstrates that they are attempting to permanently wipe data, however, are failing to use a fully effective solution. In the current rush to currently offload IT inventory, this number is only going to rise. 

Correctly purging data


Some form of format had been attempted on most of the devices analysed. In modern operating systems, there are typically two options for formatting: a full format and a quick format. A quick format is not an erasure solution because it only removes the index, but a full format attempts to overwrite the disk space visible to the operating system (OS) with zeroes. While this sounds ok on paper, the main problem is that there is no way to confirm that the data is gone. Therefore, a false sense of security is felt. Ontrack’s view is that verification and certification are key to ensuring data is permanently erased beyond recovery. 

Correctly purging the data that resides in the deep recesses of the inventory you wish to sell can be a challenge for many. Rather than relying on simple formatting, the best method for securely erasing drives is either by using a specialist data destruction company, like Ontrack, or a highly regarded data erasure software.

So how should it be done? These are the steps that any business considering selling or disposing of a drive should always go through: 

  • Back up any important data to another drive or device
  • Securely erase your drive by using data erasure software or contact a data destruction company
    • If you are using software, confirm that the software can perform the right erasure method for your type of drive
    • Confirm the total number of overwriting passes that are performed and verified by the erasure software. Each pass signifies a complete overwrite of the drive with all 0s, all 1s, or random data 
  • Double-check that all your data was, in fact, erased. If you need proof that the data sanitisation method you’ve chosen is effective, there are data recovery solutions available that will provide an auditable, tamper-proof certificate.

Uncertain times


Email, company presentations, confidential documents and bank details of customers are all commonly created and saved on the company devices of today. If this sensitive information gets into the wrong hands, it could cause irrefutable harm. Overlooking end-of-life data and the incorrect management of data procedures, including the disposal of computers and IT assets containing personal data can become a serious threat to the security of company information; it also opens the company up to a potential risk for penalties and breaches of privacy legislation.

It is understandable that in these uncertain times, businesses are trying to recoup funds by selling off unused tech, but in their rush to do so, many are not following basic data erasure procedures. Now is not the time to be cutting corners. Secure data erasure services such as ours ensure that sensitive data is securely wiped from storage media prior to being sold.


An image of Data erasure, News, Data erasure, and data security, now is not the time to cut corners

Philip Bridge

Philip Bridge, President of Ontrack. Ontrack understands data; it draws on its expert engineers and R&D facilities to solve customers data management challenges at different stages of the data lifecycle.

Hacking Cyber Security’s battle for workers

Andrew Marsh • 30th September 2022

Cyber attacks are increasing exponentially, cyber professionals are quitting, and ultimately, no one is replacing them. Worldwide, the cyber workforce shortfall is approximately 3.5 million people. We have a mountain to climb. While there are rising numbers of people with security degrees and qualifications, this falls way short of industry demand.

Getac becomes British Touring Car Championship official technology partner

Chris Gibbs • 29th September 2022

In competitive motorsports, the smallest detail can be the difference between winning and losing. Getac is the official technology partner to the British Touring Car Championships (BTCC) helping it achieve its digital transformation goals, putting a wealth of information at the fingertips of both race officials and teams alike, and helping deliver incredibly exciting racing.

The Time is Now for Digital Transformation

Paul Waddilove • 29th September 2022

According to a McKinsey research report, 70% of enterprises that had taken on digital transformation reported in 2020 that their momentum had stalled. It is worth understanding the reasons–culture or scale for example–causing the slowdown as the payoffs from digital transformation can be impressive. It can lead to more efficient operations, with enterprises enjoying autonomy...

Addressing the environmental impact of the data centre

David Watkins • 29th September 2022

David Watkins, solutions director at VIRTUS Data Centres , share how you may have seen the recent news that Thames Water has launched a probe into the impact of data centres on water supplies in and around London, as it imposed a hosepipe ban on its 15 million customers in a drought-hit area. Ensuring that...

How Can Businesses Ensure Efficient Management of COSU Devices

Nadav Avni • 29th September 2022

Nadav Avni, Chief Marketing Officer at Radix Technologies, shares how when it comes to speeding up queues and providing instant information, nothing beats corporate-owned, single-use (COSU) devices. When put in kiosk mode, these devices become efficient digital assistants that collect and share information.

The Cloud – Debunking the Myth

Guy Parry Williams • 26th September 2022

Mid-sized businesses are head down, wrestling with constantly evolving operational challenges, from skills shortages to supply chain delays and raging inflation. Management teams lack the time and often confidence to explore technology innovation and, as a result, too many companies are missing vital opportunities to cut costs, boost efficiency and reach new customers.