The Proper Methods of R2 Data Destruction
Brought to you by IBEC Intelligence
Data - everyone has it and everyone needs to keep it safe. But, what do you do when you want to get rid of it? In the world of R2 data destruction, we call it “sanitation”, or the process of (safely) disposing of data.
Watch the video below for a brief overview, then read on for all of the details you need.
Here are the four surefire ways to properly sanitize your data:
Interestingly, magnetic fields can be used to completely eradicate media and data. The main benefit of this method is that it’s clean, leaves media physically intact and is simple to execute. The only real downsides of degaussing are that reporting is limited and some equipment needs to be recalibrated.
Examples: Garner-Products, Data Security, Inc. (DSI), Secure Engineered Machinery (SEM), Proton.
There’s no mystery here - it’s just like it sounds. Physically crushing media until it is rendered unusable is another way to destroy unwanted data. This is easy and surprisingly secure but can have marginal reliability.
Examples: Phiston (MediaVise), Garner-Products, Secure Engineered Machinery (SEM)
3. Shedding or Disintegrating
Another easy method involves shredding media to a specified particle size. The main drawback? It’s dirty and not very portable.
Examples: Ameri-Shred, Alleghany, HSM, and Intimus along with Untha, SSI
4. Data Wiping or Overwriting
In R2, this is known as logical sanitation or erasure. Being a much cleaner option because you aren’t smashing media to smithereens, wiping or overwriting requires the use of specialized algorithms to achieve proper data destruction.
Examples: Blancco, White Canyon (WipeDrive), BitRaser (Stellar), XERASE (EPS), FutureDial, Pervacio
Four great and easy ways to securely eradicate your data...then, there are the things you should never do.
Things you should never do:
On their surface, these may sound like viable sanitation options. But, that couldn’t be further from the truth, because these methods allow for data recovery with very simple, highly accessible utilities (even by an amateur). Be smart with how you get rid of your data, rely on verified and approved methods, and you’ll never run the risk of being compromised.
Do you want to learn more about data destruction and how to properly take care of it at your business?