Connect with us

Hi, what are you looking for?

Tech & Science

Awareness needed of cyber risks when spring cleaning computers

Many data transfer tools are convenient. However, many also carry inherent security dangers, and for this reason individuals and small businesses need to deploy sound information technology asset disposal processes. This forms the basis of advice from the International Association of IT Asset Managers (IAITAM).

Commenting on this new area of cyber-awareness, Dr. Barbara Rembiesa, IAITAM president and CEO tells Digital Journal: “When it comes to computers, drives and other hardware, it’s not as simple as ‘out with the old and with the new.’ Consumers and small business operators need to be in the business of protecting themselves from major security liabilities that come with disposing of old electronics.”

She adds that: “Proper ITAD principles exist to protect individual data no matter how big or small the user.”

But what are the risks faced by businesses? One recent example exists with both eBay and Craigslist sellers being warned about selling used electronics with private information still intact. While the data may appear to have been deleted and may not be obvious, the virtual data thumbprint remains accessible through data recovery software.

With this regard, an international study conducted by Blancco Technology Group and Ontrack discovered that half of the electronics examined still held residual data. Of these data, 15 percent were personally identifiable. The types of private files recoverable were passport photos, copies of birth certificates, financial records, educational documents and curricula vitae.

While most people to seek to sell used electronics will use methods like disk reformatting, this method is insufficient for permanent or secure data removal. In place of reformatting, users should be looking to certified data drive sanitation and destruction methods. Furthermore, conformation that data has been erased should be via a verified certificate. It is also possible to double check if data has been erased using data recovery software.

It is also good practice to ask the person purchasing the device to also run a wipe before they use it. A device that is wiped by both the original owner and reseller is more likely to be free of rogue data.

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:


US presidential hopeful Jill Stein described the assassination attempt of Donald Trump as 'tragic' and a symptom of a 'troubled system' in America -...

Tech & Science

AI and election interference: As we approach election season, we can expect more and more of this.


A Hamas official on Sunday said the group is pulling out of Gaza truce talks, following an Israeli strike that targeted Deif.


The bodies were pulled from rubbish-strewn water in an abandoned quarry in Mukuru - Copyright AFP/File SIMON MAINATanya WILLMEREight female bodies have been recovered...