Data security - A vital part of the circular economy


Data security - A vital part of the circular economy

It is no secret that there are major risks associated with data security for companies and organisations. But risks also enable opportunities and with a smooth process for data handling, most things can be completed safely.

A relatively easy way to avoid unwanted risks is through the circular lifecycle management of IT equipment. The consequences can otherwise be costly. Cybercrime, for example, has led to global losses of over €327 billion. This means an average cost of about €385,000 for each instance of cybercrime. The EU's famous data protection regulation (GDPR) also presents companies with the risk of being fined for incorrect data management.

The most difficult part of data security management is the human element, since it is often negligence that has led to equipment being stolen, forgotten or lost, and ending up in the wrong hands. In addition, the risks also increase when staff start or finish employment, when data is transferred or when equipment is replaced.

The difference between deletion and erasure

There seems to be a general misconception that deletion is the same as erasure. In fact, data erasure involves a process of deliberate, permanent, and complete erasure of data stored on a device that makes it impossible to recover. Data that has just been deleted can often be restored, but data that has been erased cannot be recovered with any existing technology.

According to a survey by Blancco Technology Group, 78% of used, resold, or refurbished hard disk drives still had personal or confidential information on them, despite supposedly having been “wiped clean” and a more recent study by the company reveals that 42% of used devices sold on eBay still hold sensitive data. This shows that the fuss around proper data erasure is no joke.  

There are currently three ways to delete and make data restoration impossible:

  1. Physical destruction of the device (which is not very sustainable economically or environmentally)
  2. Data erasure by overwriting the data with “white” information, so that no original data is left on the device
  3. Cryptographic erasure by erasing the encryption key of a self-encrypting drive. While the data remains on the storage device itself, it’s unusable without the key

More time for business

The process for secure data retrieval and management is an essential part of effective equipment management that 3 Step IT can help with. This process provides customers with a tool for managing their devices, from planned installation to decommissioning and replacement. We can also continuously check each customer’s network of equipment, which gives the IT team more time to focus on the business.  We provide support during the whole process and ensure customers’ IT management and data security does not require more energy than what is necessary.

Want to be 100% sure about data security when disposing of IT devices? Join our webinar on 19th of June to learn how:

Register here