Search
  • IBEC

The Proper Methods of R2 Data Destruction

Brought to you by IBEC Intelligence


Data - everyone has it and everyone needs to keep it safe. But, what do you do when you want to get rid of it? In the world of R2 data destruction, we call it “sanitation”, or the process of (safely) disposing of data.


Watch the video below for a brief overview, then read on for all of the details you need.



Here are the four surefire ways to properly sanitize your data:


1. Degaussing

Interestingly, magnetic fields can be used to completely eradicate media and data. The main benefit of this method is that it’s clean, leaves media physically intact and is simple to execute. The only real downsides of degaussing are that reporting is limited and some equipment needs to be recalibrated.


Examples: Garner-Products, Data Security, Inc. (DSI), Secure Engineered Machinery (SEM), Proton.



2. Crushing

There’s no mystery here - it’s just like it sounds. Physically crushing media until it is rendered unusable is another way to destroy unwanted data. This is easy and surprisingly secure but can have marginal reliability.


Examples: Phiston (MediaVise), Garner-Products, Secure Engineered Machinery (SEM)



3. Shedding or Disintegrating

Another easy method involves shredding media to a specified particle size. The main drawback? It’s dirty and not very portable.


Examples: Ameri-Shred, Alleghany, HSM, and Intimus along with Untha, SSI



4. Data Wiping or Overwriting

In R2, this is known as logical sanitation or erasure. Being a much cleaner option because you aren’t smashing media to smithereens, wiping or overwriting requires the use of specialized algorithms to achieve proper data destruction.


Examples: Blancco, White Canyon (WipeDrive), BitRaser (Stellar), XERASE (EPS), FutureDial, Pervacio



Four great and easy ways to securely eradicate your data...then, there are the things you should never do.


Things you should never do:

  • File deletion

  • Disc formatting

  • OS reinstallation

On their surface, these may sound like viable sanitation options. But, that couldn’t be further from the truth, because these methods allow for data recovery with very simple, highly accessible utilities (even by an amateur). Be smart with how you get rid of your data, rely on verified and approved methods, and you’ll never run the risk of being compromised.


Do you want to learn more about data destruction and how to properly take care of it at your business?


Schedule a free 30-minute consultation


47 views