According to Paul Henry, our IT Security Consultant, “One of the more glaring discoveries from our study is that most people attempt in some way or another to delete their data from electronic equipment. But while those deletion methods are common and seem reliable, they aren’t always effective at removing data permanently and they don’t comply with regulatory standards.”

As part of our global data security study with Kroll Ontrack, we examined 122 used mobile devices, hard disk drives and solid state drives that were sold on Amazon, eBay and Gazelle.com. Here are the top 3 findings from our study:

  • 48 percent of the used hard disk drives and solid state drives contained residual data, while thousands of leftover emails, call logs, texts/SMS/IMs, photos and videos were retrieved from 35 percent of the used mobile devices.
  • A deletion attempt had been made on 57 percent of the mobile devices and 75 percent of the drives that contained residual data.
  • On four of the drives containing residual data, or 11 percent, only a basic delete was performed, meaning that the user simply deleted the file or sent it to the recycle bin. This left 444,000 files exposed.

 

Get your FREE Research Study!

Occasionally, we may send emails to notify you of webinars, product or company updates. You will always have an option to opt-out.

What You Will Learn:

eye icon

An overview of varying data removal methods on drives and mobile devices and the effectiveness of each

hammer wrench icon

The differences between basic file deletion commands and certified data erasure

checklist icon

Tips on what to do before reselling or buying back used electronics

Here Is Another Piece of Content We Think You Might Like

 

The Big Business of Big Data—How to Maximize Customer Service Without Compromising Privacy

Read our blog post to better understand how your business can maximize customer service without putting privacy at risk. Businesses have a tendency to compartmentalize customer experience and privacy into two very separate and disconnected buckets. This happens because it is often assumed the two cannot co-exist, or one has to take greater priority. It doesn’t have to be this way.

Why Blancco

We’ve been certified, approved and recommended by 18 national and international governing bodies.
No other security firm can boast this level of compliance.

View Our Certifications