NAID 2018 Session: “What Information is Really on Old Devices & Why it Matters”
Posted in Blog
Glenn Laga, President of Guardian Data Destruction, introduced John Shegerian, Executive Chairman of ECS — one of the largest IT recyclers in the world, as the speaker for “What Information is Really on Old Devices & Why it Matters” session at NAID 2018. John reviewed the private and potentially dangerous content that can be easily accessed on discarded – even “wiped” – hardware. The post-session Q&A included enterprise and solid state drive (SSD) data destruction and technology questions from the audience:
Q1. How can you guarantee that all the data is destroyed when a data center is destroyed or wiped, i.e., how do you know that the data is not residing anywhere else?
A1: When you are shredding, degaussing or wiping a hard drive or an enterprise data center, you are destroying a physical device with data on it. If the data is residing at a data center with redundancy, chances are very likely that the same data will be residing in 2-3 additional data centers that are mirrors of the data center you are working on destroying. Understanding the backups and mirrors of your data centers is the only way to completely destroy the data.
Q2. How do you shred solid state drives?
A2: Solid state drives (SSD) require a 2 mm (finer) shred because chips hold the memory instead of a magnetic platter. The chips are very small – ½” to 1” — so the finer shred is required to ensure absolute data destruction.
Q3: What type of shredder would you use on a solid state drive (SSD)?
A3: Currently, there are only two manufacturers/mobile service providers of solid state drive shredding (2 mm). Ask Guardian Data Destruction for more information.
We also recommned
15 essential factors for IT asset management and data destruction
If your goal is to ensure that data doesn’t show up where it shouldn’t, these 15 essential factors for IT asset management and data destruction will help you develop a defensible data destruction policy and secure IT asset management process.
Overflow warehousing for IT asset disposition, security and transitions
Secure, overflow warehousing designed for IT asset storage and processing is the solution for ITAD, VAR and reseller when space, receiving and client services are a problem
8 Post-pandemic Predictions for the Planning of Data Security and IT Asset Management and Disposition
We’ve pinpointed eight post-pandemic workplace trends that will affect the planning of data security and IT asset management and disposition from budgeting, purchasing through end of life disposition. Here’s what you need to know.
Stay in the know
Get relevant information right in your inbox
We do not sell or share your information with anyone