Connect with us

Hi, what are you looking for?

Tech & Science

Awareness needed of cyber risks when spring cleaning computers

Many data transfer tools are convenient. However, many also carry inherent security dangers, and for this reason individuals and small businesses need to deploy sound information technology asset disposal processes. This forms the basis of advice from the International Association of IT Asset Managers (IAITAM).

Commenting on this new area of cyber-awareness, Dr. Barbara Rembiesa, IAITAM president and CEO tells Digital Journal: “When it comes to computers, drives and other hardware, it’s not as simple as ‘out with the old and with the new.’ Consumers and small business operators need to be in the business of protecting themselves from major security liabilities that come with disposing of old electronics.”

She adds that: “Proper ITAD principles exist to protect individual data no matter how big or small the user.”

But what are the risks faced by businesses? One recent example exists with both eBay and Craigslist sellers being warned about selling used electronics with private information still intact. While the data may appear to have been deleted and may not be obvious, the virtual data thumbprint remains accessible through data recovery software.

With this regard, an international study conducted by Blancco Technology Group and Ontrack discovered that half of the electronics examined still held residual data. Of these data, 15 percent were personally identifiable. The types of private files recoverable were passport photos, copies of birth certificates, financial records, educational documents and curricula vitae.

While most people to seek to sell used electronics will use methods like disk reformatting, this method is insufficient for permanent or secure data removal. In place of reformatting, users should be looking to certified data drive sanitation and destruction methods. Furthermore, conformation that data has been erased should be via a verified certificate. It is also possible to double check if data has been erased using data recovery software.

It is also good practice to ask the person purchasing the device to also run a wipe before they use it. A device that is wiped by both the original owner and reseller is more likely to be free of rogue data.

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Business

The event will spotlight the companies and people driving Canada’s scaleup economy — and why they matter more than ever.

Tech & Science

Astronomers announced that they had detected the most promising "hints" of potential life on a planet beyond our solar system.

Business

Governments are looking to strike trade deals with Washington to temper the impact of Donald Trump's tariff blitz - Copyright AFP STRTokyo led stocks...

World

Trump is, however, also expected to raise his demand for NATO allies to spend more on defense -- a huge demand for debt-laden Italy.