What data thieves hope we DON’T already know…

Whether we’re working from a corner office or from our dining room table these days, we rely more heavily on technology than ever before. As a result, we exchange sensitive data such as social security numbers, banking and credit card details, medical records, and other privileged information at lightning speeds. We then save that information to hard drives located inside the IT equipment we use each day, so it is critical we remember just how accessible this data actually is to the data thieves who know how (and where) to find it.

While data conscious organizations employ a variety of security measures such as password protected WiFi networks, VPNs, firewalls, and software solutions designed to safeguard against hackers, it is important to note these same unscrupulous scammers are also counting on our lack of technical knowledge when it comes time to replace the technology in our homes and offices. In fact, there are three major points data thieves are counting on us to get wrong, leaving us, our businesses, and all those who trust us, vulnerable to a catastrophic data breach.

1. They’re hoping we don’t know that deleting and reformatting the hard drive inside our computer before replacing it only frees up more storage space, and in most cases does nothing to eradicate the data stored to the device, which remains recoverable long after the equipment is retired. To permanently erase data, a hard drive must be sanitized or degaussed prior to repurposing or recycling IT equipment. Both data destruction methods meet or exceed NIST 800-88, the DoD 5220.22-M three pass, and the NSA standard as well as all industry specific regulatory requirements and will safeguard against a breach.

2. They’re hoping we don’t realize that sensitive data is stored in places other than on a laptop or desktop computer. In fact, our cell phones, tablets, printers, scanners, and servers have memory centers where data remains  until it is effectively eliminated. These devices are often discarded at the end of their lifecycle, exposing us to an unexpected data leak. This type of exposure can be avoided by responsibly recycling e-waste.

3. They’re hoping we are unaware of the industry requirements and regulatory compliance we must adhere to at the end of the IT asset lifecycle. These requirements are in place to eradicate the data the criminals are in search of.       

While a simple internet search will prove just how easy it is to fall victim to a data breach, we don’t have to look far for examples. In fact, the media has reported on several recent data incidents, politically tied and consumer related, which have had catastrophic results during the last month alone. The good news is, these events are almost always avoidable and there are inexpensive measures we can all take to mitigate the threat of such a breach. 

To ensure your business meets regulatory requirements, reaches corporate social responsibility goals, and to learn more about data destruction and e-waste recycling methods, call 631.403.1100 to talk to a data specialist or visit us at Pupfish Sustainability Solutions today.  

Previous
Previous

National Data & Privacy Protection Day

Next
Next

Take steps to avoid a Catastrophic Data Breach