Data Erasure

The news is exploding with stories of high profile cases concerning the loss of sensitive data, emphasizing the need to properly destroy that data. Data erasure allows companies to mitigate risk, achieve compliance and reduce the risk of data breaches. By completely destroying information, businesses can feel secure that their employee and customer data is safe. Read the blogs to find out more.

The Data that Remains: Testing Android Phones after Factory Resets

When it comes to mobile phones, the “circular economy” gives second-hand devices a longer life in the hands of users, reduces the need for purchasing brand-new phones, preserves resources and reduces the impact of digital waste on the environment. This often involves recycling materials and reusing components such as the microprocessor and memory storage in mobile devices. For example, if a smartphone has been damaged and doesn’t boot up anymore, … Read More

Everything You Need to Know About the DoD 5220.22-M Wiping Standard & Its Applications Today

When vendors state that their solutions meet the DoD 5220.22-M “standard,” it typically means that their software will write to all addressable hard drive locations with a character, its complement and a random character. It must then be followed by verification. This “three-pass” procedure is designed to prevent data from being recovered by commercially available processes. But is the DoD 5220.22-M standard the best wiping method for your organization? Read … Read More

Adapt or Die: Why MSPs are Turning to Software as a Service

Managed Service Providers (MSPs) are facing mounting pressure to ‘evolve or die’ as our technological world advances. New technologies can no longer be ignored, and economic pressures and increasing customer demands mean MSPs need to be taking a fresh look at their business if they hope to go the distance. Customers are demanding so much more of their MSPs, and margins have been slowly driven down, so MSPs must adapt … Read More

A Comprehensive List of US Data Disposal Laws

Most businesses have access to Personally Identifiable Information (PII). This information is sensitive and must remain confidential—both during the customer’s active business with the company and after that relationship has ended. Businesses found to be careless with the management of PII, and its eventual disposal, can be harshly penalized, especially in this post-GDPR era. Compliance is key. Data breaches are costly to businesses; companies that have allowed personal data to … Read More

Is Your Business’ BYOD Policy Posing a Security Threat?

In today’s age of flexible working, virtual offices and the thoroughly modern business, the “Bring Your Own Device” (BYOD) policy is becoming increasingly popular. This means employees are expected to use their own personal devices – such as mobile phones and laptops – to carry out their workplace duties. For many organizations, implementing a BYOD policy is cost-effective, as it cuts the expense of purchasing devices for all employees, a … Read More

Enterprise Data Erasure:
Your Last Line of Defense
Download the White Paper
how to securely erase different ssds
White Paper
How to Securely Erase Different SSDs: NVMe, PCIe and More
Download Now
desktop erasure
Case Study
Globe Telecom Data Erasure Case Study
Read Case Study

Top Categories