Computerworld - How do you deal with the sensitive data on your high-tech junk? One way is to send your old PCs to a company that makes a business of handling decommissioned corporate computers. These days, they'll charge you an extra $10 to $30 just to make sure the hard disks are completely erased .
Sure, that's more than you want to spend. But it's a bargain compared with what a lawsuit might cost if sensitive customer information leaks out of your company on the unerased hard disk of a discarded PC. It's a small price to pay for peace of mind.
But if what you want is peace of mind, it's nowhere near enough.
Does that sound a little paranoid? Maybe it is. But I've purchased thrift-store PCs and junk-shop hard disks. And yes, I've scanned through their contents before repartitioning the drives. I've seen personal letters and business correspondence, contracts and legal papers, Social Security numbers and other customer data. All you need is to scan a few recycled hard disks to gain a healthy paranoia about junkers that contain valuable information. I've scanned dozens.
I've also seen the results of projects by researchers such as Simson Garfinkel at Sandstorm Enterprises, who found high-tech vendor source code, financial information from investment firms, thousands of credit card numbers and even internal Microsoft e-mails on secondhand hard disks he bought at swap meets and used-computer stores and on eBay.
So my peace-of-mind threshold is pretty high when it comes to data on high-tech junk. Maybe yours should be, too.
After all, that PC recycler may do a highly professional job of wiping your junked PCs' hard disks. But before that happens, those PCs will sit on your loading dock -- then on a truck, then on the recycler's loading dock. There may be plenty of opportunities for someone to walk off with your data.
How do you keep it safe until it's wiped? The simplest answer: Use a $50 commercial software package to wipe the disks yourself, before they go to your loading dock. Then pay the PC recycler's fee to have them wiped again. Sure, that's a belt-and-suspenders approach, but it cuts the risk of a stolen junker exposing sensitive data. It also eliminates the single point of failure of one disk-wiping session.
But that's not the only small price you'll have to pay to protect your data. There's probably data hiding on other high-tech junk, too.
Backup tapes are easy enough to deal with. You are using a $100 bulk eraser to wipe them before you trash them, right?
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts