Connect with us

Hi, what are you looking for?

Tech & Science

Awareness needed of cyber risks when spring cleaning computers

Many data transfer tools are convenient. However, many also carry inherent security dangers, and for this reason individuals and small businesses need to deploy sound information technology asset disposal processes. This forms the basis of advice from the International Association of IT Asset Managers (IAITAM).

Commenting on this new area of cyber-awareness, Dr. Barbara Rembiesa, IAITAM president and CEO tells Digital Journal: “When it comes to computers, drives and other hardware, it’s not as simple as ‘out with the old and with the new.’ Consumers and small business operators need to be in the business of protecting themselves from major security liabilities that come with disposing of old electronics.”

She adds that: “Proper ITAD principles exist to protect individual data no matter how big or small the user.”

But what are the risks faced by businesses? One recent example exists with both eBay and Craigslist sellers being warned about selling used electronics with private information still intact. While the data may appear to have been deleted and may not be obvious, the virtual data thumbprint remains accessible through data recovery software.

With this regard, an international study conducted by Blancco Technology Group and Ontrack discovered that half of the electronics examined still held residual data. Of these data, 15 percent were personally identifiable. The types of private files recoverable were passport photos, copies of birth certificates, financial records, educational documents and curricula vitae.

While most people to seek to sell used electronics will use methods like disk reformatting, this method is insufficient for permanent or secure data removal. In place of reformatting, users should be looking to certified data drive sanitation and destruction methods. Furthermore, conformation that data has been erased should be via a verified certificate. It is also possible to double check if data has been erased using data recovery software.

It is also good practice to ask the person purchasing the device to also run a wipe before they use it. A device that is wiped by both the original owner and reseller is more likely to be free of rogue data.

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Tech & Science

The arrival of ChatGPT sent shockwaves through the journalism industry - Copyright AFP/File JULIEN DE ROSAAnne Pascale ReboulThe rise of artificial intelligence has forced...

Business

Malaysian Prime Minister Anwar Ibrahim has announced a plan to build a massive chip design park - Copyright AFP/File Tobias SCHWARZMalaysia’s leader on Monday...

World

A Belgian man proved that he has auto-brewery syndrome (ABS), which causes carbohydrates in his stomach to be fermented, increasing ethanol levels in his...

World

Taiwan's eastern Hualien region was also the epicentre of a magnitude-7.4 quake in April 3, which caused landslides around the mountainous region - Copyright...