A DCO lock prevents DCO setting modification. Since a locked DCO is not accessible to the user, it can potentially pose a threat to data security, if data has been stored on the DCO.
New data breach strategies and attacks have made it imperative that standards be put in place to protect credit card data. The Payment Card Industry Data Security Standard (PCI DSS) is an ongoing regulation started in 2006 to ensure that all companies that accept, process, store or transmit credit card information do so in a secure environment.
The hard drive retirement process is one of the most neglected security threats most companies face today. Data contained in old or retired hard drives can put your organization at equal risk to other attack vectors. Take the opportunity to see how your organization may be at risk and how to address any security holes you may have in regards to your hard drive retirement process.
While WipeDrive software allows you to do any number of passes using any wipe pattern, there is no compelling evidence to suggest that any more than one pass is necessary to ensure complete data erasure. This report briefly explains why organizations use multiple passes and why we don't currently see them as being necessary.
Disk encryption is a useful way to secure data, but there are problems with relying on encryption alone to protect data after drive disposal. Using drive wiping in conjunction with cryptographic key erasure solves these problems.
The worlds strictest data protection regulations have recently gone in to effect. General Data Protection Regulation's newest updates aim to protect all EU citizens from privacy and data breaches. Every organization that collects and/or processes data from people in the EU is subject to GDPR and needs to comply.
Encrypting hard drives adds an effective new level of data protection and security for organizations. However, there is a disturbing trend of relying upon encryption as a form of data sanitization. While encrypted data may seem inaccessible it should never be considered 'sanitized' since all of the data remains and various risk factors threaten this approach.
WipeDrive's overwrite speed varies depending on the drives size, speed, type, number of overwrite passes, and other factors. Although there is no simple answer, we have compiled some data to help you estimate wipe times for your system.
There is a significant difference between software claiming to be "in compliance" with standards and software that is "certified" by recognized security organizations. Learn why certification is important and why relying only on compliance is dangerous.
This webinar shows the critical risk factors involved in retiring hard drives and how to significantly reduce the security risk involved with retiring hard drives and data sanitization. We will go over optimal security practices, highlight 5 common security holes and how to protect your process against them.
Watch a short introduction to WipeDrive and some of its standard configuration and deployment options.
We are dedicated to providing you the best possible data erasure solution. We know we can make your hardware retirement process more efficient and more secure. Ask us how or read how we have helped these companies in substantial ways.
Cascade Asset Management employed WipeDrive's automation features to achieve incredible productivity gains and cost savings.
CitiGroup uses WipeDrive's audit logging features to ensure that absolutely no data spillage occurs.
CWI chose WhiteCanyon's WipeDrive for its data sanitization and automation needs. WhiteCanyon was able to deliver a comprehensive solution that met all of CWI's requirements by not only wiping computers to the highest standard, but also by improving the efficiency and effectiveness of their underlying work flow.
Deloitte uses WipeDrive's remote wiping ability to eliminate the time and expense required to ship computers for data erasure.
Sipi used WipeDrive's extensive customization options to increase productivity and improve their audit SLA's
We want you to have the information you need to keep your data secure at all times, and so we have created a library of useful articles that will help you understand the process and your options. Follow the links below to view each article.
- Do You Know What Your Disposal Strategy Is?
- Forms of Data Destruction
- Gramm-Leach-Bliley Act Privacy Compliance
- High Volume Data Erasure
- How Does Your Law Firm Erase Old Data?
- IT Asset Management
- Software Wiping vs. Physical Data Destruction
- The Risks of Shredding Drives Internally
- What Is the Best Method for Data Sanitization?