We perform secure erasure (Wiping) of data in any storage media to ensure confidentiality and secure personal data from theft and abusive access due to device transfers.
Secure Data Erasure in addition to being prescribed by the new Privacy Code, is a good information security practice when a computing device, be it a Personal Computer, server, or mobile device is no longer in use. Whenever a device is decommissioned or its intended use is changed, it is necessary to ensure that the information it contains does not become a source of information for malicious users who could use that information to cause harm to the rightful owner.
In order to be certain that the data is completely destroyed without any possibility of recovery, it is essential to use an appropriate secure erasure method. Our technicians use the following secure erasure techniques:
- Multiple overwriting: technique that allows the destruction of data using applications capable of writing insignificant data; the application, in particular, overwrites all data present with random sequences of bits. The security level of this method depends on the number of times the entire medium is installed, making complete erasure possible;
- Clearing and overwriting of encrypted data: a technique used on smartphones and tablets to ensure, when the device is transferred to another owner, that the previous owner’s data cannot be recovered;
- Degaussing: demagnetization involves the use of an instrument that generates an electromagnetic field such that the data on the media are destroyed. The electromagnetic field generated must be able to overcome the shielding present in the media themselves. This technique can be used on magnetic or magneto-optical devices (hard disks, floppy disks, magnetic tapes), rendering such media completely unusable;
- Physical destruction: this technique consists of the physical destruction of the media through disintegration, incineration, pulverization, crushing or chemical treatment. Through this approach, the data on the media are not destroyed but the drive is rendered completely unusable to prevent data recovery. The technique is applicable to magnetic, optical and flash memory media, regardless of their operation.
Ask for a consultation
DarkBox® CyberSecurity is a unique partner for the growing security needs in the IT field.
Contact us!