Print Article
  BookMark Article

Categories    Category List

  Accessories (0)
  Advice (0)
  Aging (0)
Arts (24)
  Arts And Crafts (0)
  Automotive (3)
  Break-up (2)
Business (289)
  Business Management (1)
  Cancer Survival (0)
  Career (58)
Cars And Trucks (42)
  CGI (0)
Coding Sites (1)
Computers (16)
  Computers And Technology (2)
Cooking (0)
Crafts (0)
  Culture (0)
Current Affairs (1)
Databases (0)
  Education (0)
Entertainment (3)
  Etiquette (0)
  Family Concerns (0)
  Film (0)
Finances (4)
  Food And Drinks (0)
Gardening (0)
Healthy Living (17)
Holidays (1)
Home (1)
  Home Management (0)
Internet (83)
  Jewellery (0)
  Legal (90)
  Marriage (0)
Medical (0)
  Medical Business (0)
  Medicines And Remedies (0)
Men Only (1)
Motorcyles (0)
Our Pets (2)
Outdoors (2)
  Parenting (0)
  Pets (1)
  Recreation (2)
Relationships (7)
  Self Help (0)
Self Improvement (0)
  Society (0)
Sports (3)
Staying Fit (0)
Technology (20)
Travel (13)
Web Design (1)
Weddings (0)
  Wellness, Fitness And Di (0)
Women Only (53)
  Womens Interest (0)
  World Affairs (0)
Writing (30)

Online Now    Online Now

Guests Online (35)

Author Login    Author Login

Welcome Guest! Please login or create an account.



If you do not have an account yet, you can register ( Here ), or you may retrieve a lost user/pass ( Here ).

Navigation    Navigation

   10 newest articles RSS

Author Highlights    Featured Author

Alison Thompsonn

"I have two grade school-aged children, and love discovering great toys with them. We..."

View My Bio & Articles

Bobbir Donnigen

View My Bio & Articles

Mark Robert
Pulham St Mary

View My Bio & Articles

Our Sponsors    Our Sponsors

A Guide To Data Destruction

Author : Jamie Simpson

Submitted : 2011-03-30 18:06:31    Word Count : 461    Popularity:   8

Tags:   data destruction

Author RSS Feed   Author RSS Feed

Data destruction is often over looked when developing a comprehensive security plan. However, it is one of the most important components of an effective security plan. Discarding data without proper destruction can result in the data falling into the hands of criminals and have devastating public relations effects. Data needs to be secured and protected from the time that it is written until the time that it is properly disposed of; failure to do this can result in liability from breaches and leaks. There are many ways to properly dispose of data, and the best methods employ a variety of these options. Data can be overwritten, magnetically destroyed or even shredded.

To overwrite the data, the drive or disk is rewritten several times to make it difficult to recover previous information from the drive. Typically, the drive will first be erased, and then it will be overwritten and erased again, until the desired threshold is met. It is important to note that the drive may need to be over written as many as thirty times to prevent data from being recovered! This method can be part of a data destruction plan, but should not be relied upon to be the entire plan in itself.

Magnetically destroying a drive uses powerful magnets to scramble the information on the drive. One must take special care to ensure that the magnets only come in contact with media that has data on it that needs to be destroyed; it is possible to inadvertently destroy data that needs to be saved in this manner. However, as with overwriting data, sometimes the information can still be recovered. It is best to use another method alongside this one.

Shredding the data is the most effective way to ensure its destruction. Industrial grade shredders can shred drives or disks into tiny fragments, making recovery of the data nearly impossible. When used with overwriting or magnetic destruction, this is the best method to ensure the data is completely destroyed and is not capable of recovery.

The best data destruction plan will incorporate all of the methods above. It will start with the data being overwritten, then magnetically destroyed, and then shredded. This is the best way to ensure the data will never wind up in the wrong hands and that a costly leak or breach will be avoided.

Data destruction can seem like a daunting task, but it is needed to ensure maximum security. If sensitive data is involved, it is best to use multiple means of destruction together to ensure that the data cannot be recovered at all. It might be tempting just to toss a hard drive and believe it to be safe in the landfill, but this can lead to data leaks and breaches.

Author's Resource Box

Find out more about data destruction.

Article Source:
Ezine and Web Articles


  Report Article
Badly Written Offensive Content Spam
Bad Author Links Mis-spellings Bad Formatting
Bad Author Photo Good Article!