All Posts Tagged: devices
It’s that time of year for giving and receiving. With giving and receiving comes the all-important erasing.
Annual worldwide mobile phone sales in 2014 surpassed 1 billion. That’s a lot of phones. And you can bet for every phone sold there’s probably a previous model being tossed — many, no doubt, chock full of personal data.Erasing isn’t enough?
So before you dispose of old phones, laptops, desktop computers, or — I’ve added this year — portable storage devices, take a few minutes to securely wipe your hard drive.
“Deleting,” “wiping,” and “zeroing” a hard drive are not synonymous. Simply deleting or reformatting the hard drive is not enough. When you delete files, you’re making the data invisible, but you are not erasing the data. However, wiping or zeroing data completely erases the existence of the data which prevents a third party from recovering those deleted files.
Here’s a simple holiday gift idea: If you’re giving a new device to someone — a family member, friend or employee — also take a minute to show them how to protect themselves by removing their data from old devices.Resources that can help
Regardless of whether your hard drive is internal or external, you should protect your privacy by getting rid of data on your old devices. Instructions for completing this important step can be found on the manufacturer’s websites:
- Microsoft: Safely dispose of computers and other devices.
- Apple Mobile: What to do before selling or giving away your iPhone, iPad, or iPod touch.
- Mac: Erase your drive (See the Erase your drive install OS X in this link).
- Android: Backing up and resetting Android One devices.
- Blackberry: Reset instructions for Blackberry devices.
- Chromebook: Wipe a Chrome device.
The other option for clearing a computer of data is to use a software program, many of which are free. One of the more popular ones is Darik’s Boot and Nuke, or DBAN, designed for personal use. A business may want or need a more powerful program.
Have fun with your new devices. Just make sure hackers and thieves don’t have fun with all the data (personal information, pictures, documents, etc.), on your old devices.
Find more statistics at Statista
All it takes is one device to become infected or infiltrated by hackers to expose a business’s entire network and put its customers at risk.Read More ›