{"id":648,"date":"2016-05-12T14:08:38","date_gmt":"2016-05-12T14:08:38","guid":{"rendered":"http:\/\/www.securityinshredding.com\/blog\/?p=648"},"modified":"2018-07-02T12:37:31","modified_gmt":"2018-07-02T12:37:31","slug":"hard-drive-must-be-destroyed-to-ensure-data-destruction","status":"publish","type":"post","link":"https:\/\/www.securityinshredding.com\/blog\/hard-drive-must-be-destroyed-to-ensure-data-destruction\/","title":{"rendered":"Hard Drive Must Be Destroyed To Ensure Data Destruction"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-431\" src=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/03\/hd.jpg\" alt=\"harddrive destruction, Media Destruction, Confidential Shredding Service\" width=\"670\" height=\"300\" srcset=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/03\/hd.jpg 670w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/03\/hd-300x134.jpg 300w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2016\/03\/hd-500x224.jpg 500w\" sizes=\"(max-width: 670px) 100vw, 670px\" \/><\/p>\n<p>All <strong>digital data<\/strong> is stored on a hard drive. Weather its stored locally (your own device) or on a cloud server, the data is stored on a hard drive. The device used to access this data be it a computer, laptop or tablet technology will become outdated or slow to use. When the time comes you may wish to get rid or sell the outdated device.<\/p>\n<p>This is where the data risk lies. Before you sell the device you might have deleted all your local data from the device or even formatted the drive. This does not remove the data from the drive.<\/p>\n<p>The fact is there are software programs designed to help thieves extract data even after data has been electronically destroyed.<\/p>\n<p>At the same time, there are other concerns that make secure e-media and hard drive disposal a critical aspect of device security.<\/p>\n<h2><strong>Current Storage Drive Trends:<\/strong><\/h2>\n<p><strong>Affordable. \u00a0<\/strong>Hard-drives and storage devices\u00a0in desktop computers, laptops, servers, phones, USB thumb drives, printers, copiers, and other equipment have become widey available and affordable. In 2015, technology companies shipped more than 2.6 billion devices containing hard drives, according to IT research firm Gartner.<\/p>\n<p><strong>Internet of Things (IoT).<\/strong>\u00a0 Digital data storage and usage is increasing in businesses and organisations. This increased usage means that more and more devices are connected to a network and can increase the risk of data breaches within a network. Protecting against these potential as data breaches are increasing.<\/p>\n<p><strong>Upgrading.<\/strong> \u00a0Electronics become obsolete (and are replaced) within three or four years \u2013 and that affects BYOD security\u00a0and other safeguards. We live in a world where the number of mobile devices exceed the number of people in the world. When upgrading ensure that the older device is destroyed or the data storage device is destroyed.<\/p>\n<p><strong>Cybercrime. <\/strong>\u00a0Industry experts predict a continued boom in cybercrime. In America the terms of cost, the average consolidated total cost of a data breach rose 23% to $3.8 million in 2014 compared to the previous year. The 2015 Cost of Data Breach Study: Global Analysis from Ponemon also showed that the average global cost for each lost or stolen confidential record increased from a consolidated average of $145 to $154.<\/p>\n<p>If it can happen in America it can happen anywhere else. Most of the applications you use will be developed globally and the breaches<\/p>\n<p><strong>Responsibility. \u00a0<\/strong>Data Protection is a corporate priority and responsibility. <a href=\"https:\/\/www.dataprotection.ie\/\" rel=\"nofollow\">The Data Protection Commissioner<\/a>\u00a0is set up to ensure that businesses and organisations are protecting data correctly. The DPC also provides guideline on how to protect your business data from breaches. Guidelines can be read here:\u00a0<a href=\"https:\/\/www.dataprotection.ie\/docs\/Guidance-Material-Menu-Page\/m\/219.htm\" rel=\"nofollow\">https:\/\/www.dataprotection.ie\/docs\/Guidance-Material-Menu-Page\/m\/219.htm<\/a><\/p>\n<p><strong>Secure<\/strong> <strong>document<\/strong><strong> shredding<\/strong> and <a href=\"https:\/\/www.securityinshredding.com\/it-hard-drive-destruction.php\"><strong>media destruction<\/strong><\/a> companies will provide secure method of data destruction. For more information please visit our site.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>All digital data is stored on a hard drive. Weather its stored locally (your own device) or on a cloud server, the data is stored on a hard drive. The device used to access this data be it a computer, &hellip; <a href=\"https:\/\/www.securityinshredding.com\/blog\/hard-drive-must-be-destroyed-to-ensure-data-destruction\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[8,6,26],"tags":[37,12,58,29,28,39,27],"_links":{"self":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/648"}],"collection":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/comments?post=648"}],"version-history":[{"count":5,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/648\/revisions"}],"predecessor-version":[{"id":1285,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/648\/revisions\/1285"}],"wp:attachment":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/media?parent=648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/categories?post=648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/tags?post=648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}