The world of data security is always evolving. To help you keep up on the latest development, we have complied a variety of white papers that our customers have found helpful in their decision making processes.
Disposal of drives and other data-bearing hardware is a necessary but often neglected part of every organization’s IT lifecycle. However, many companies skim over this process and leave potential gaps that can be exploited. Fortunately, these gaps are easy to fix with a little awareness and the right tools. This whitepaper explores seven commonly missed security gaps when retiring their drives and resolutions.
When it comes to software distribution methods, you have a wide array of options you can utilize, from CDs, DVDs, and Blu-ray discs to USB drives, the Cloud, and a PXE network. There are key differences with each method that will determine how much interaction is required by the IT technician or person responsible for installing the software application onto the device.
The hardware assets leaving your organization can be a security risk – even after they’re discarded. Cyber criminals have gone to great lengths to access storage media, even going through landfills. Physical destruction remedies this possibility by reducing hard drives and other stargate devices to shreds. However, with 3.4 million tons of e-waste going into landfills every year (according to the U.S. Environmental Protection Agency in 2014), the chance your sensitive data is at risk, is higher than you may think.
Devices connected to your corporate network may contain data believed to have been deleted. Exposure of sensitive company data can put your security at risk. It can jeopardize the reputation of your business and risk violations of industry and federal regulations. These are just a few reasons to use hard drive wipe software to address data persistence and data remanence.
There is a significant difference between software claiming to be "in compliance" with standards and software that is "certified" by recognized security organizations. Learn why certification is important and why relying only on compliance is dangerous.
New data breach strategies and attacks have made it imperative that standards be put in place to protect credit card data. The Payment Card Industry Data Security Standard (PCI DSS) is an ongoing regulation started in 2006 to ensure that all companies that accept, process, store or transmit credit card information do so in a secure environment.
Encrypting hard drives adds an effective new level of data protection and security for organizations. However, there is a disturbing trend of relying upon encryption as a form of data sanitization. While encrypted data may seem inaccessible it should never be considered 'sanitized' since all of the data remains and various risk factors threaten this approach.
The worlds strictest data protection regulations have recently gone in to effect. General Data Protection Regulation's newest updates aim to protect all EU citizens from privacy and data breaches. Every organization that collects and/or processes data from people in the EU is subject to GDPR and needs to comply.
The hard drive retirement process is one of the most neglected security threats most companies face today. Data contained in old or retired hard drives can put your organization at equal risk to other attack vectors. Take the opportunity to see how your organization may be at risk and how to address any security holes you may have in regards to your hard drive retirement process.
While WipeDrive software allows you to do any number of passes using any wipe pattern, there is no compelling evidence to suggest that any more than one pass is necessary to ensure complete data erasure. This report briefly explains why organizations use multiple passes and why we don't currently see them as being necessary.
The United Arab Emirates requires all agencies meet National Electronic Security Authority (NESA) compliance regulations. These regulations are meant to limit the exposure of data loss and data breaches by government agencies. This report reviews the NESA requirements and what UAE agencies can do to meet them.
The Common Criteria for Information Technology Security Evaluation is an international standard for computer security certification managed by 30 member countries. WipeDrive Enterprise obtained EAL 2+ certification on a data erasure security target and received evaluation by a Common Criteria certified lab. This rigorous certification is the most comprehensive certification currently available.
The National Health Service in the UK recently made major changes to their data sanitisation guidelines. These guidelines were published in the Destruction and Disposal of Sensitive Data: Good Practice Guidelines and in the Sanitisation, Reuse, Disposal and Destruction of Electronic Media: Guidance For Health and Care Organisations policy updates. The updated guidelines provide recommendations for the secure erasure of patient data on many different types of media.
WhiteCanyon Software selectively pursues intellectual property protection on methods and developments in the data erasure industry. This patent protects the process of wiping data on a computer that is reported lost or stolen. This patent reaffirms WhiteCanyon Software as the world leader in data erasure technology.
WhiteCanyon Software selectively persues intellectual property protection on methods and developments in the data erasure industry. In practicing full disk erasure with encryption key destruction, we created the concept of a patent for the sanitization method on an encrypted disk drive.
Many SSD, NVMe and hard drive manufacturers provide OEM Tools for formatting, partitioning and secure erasure. Though many groups on the internet provide support for OEM Tools as an alternative to commercial data wipe solutions, this paper explains why OEM tools fail to be a practical replacement and addresses their major issues.
Data removal has been a requirement in organizations since data-bearing devices held confidential and proprietary data. Low Level Format (LLF) and OEM Tools may have once worked on data storage devices (some argue that these options were never fully successful) but technical advances have made these options obsolete.
Changes in technology and data storage devices have forced the DoD 5220.22-M erasure standard to be re-evaluated. The following document discusses the DoD 5220.22-M deletion standard, its efficacy today and discover what organizations are using for their proven wipe method.