Oct 01, 2020
The recommended deletion process is a three-step procedure: sanitization, verification and documentation. We detailed the sanitization method in our previous blog article on data sanitization, and in this article, we will elaborate on verification and documentation.
Data volume and the number of data storage devices have grown exponentially. This has led to the significant increase in the time required for disk sanitization, both in terms of the number of devices and data storage capacities.
Data sanitization is an important function while performing data cleansing, from data creation to data destruction, also called the life cycle of data. Once data has reached the end of its life, obsolete or redundant, it is important to destroy, clean, or sanitize that data securely. According to Gartner, a global research and advisory company providing information and tools for leaders in IT, there are three methods to achieve data sanitization: physical destruction, cryptographic erasure, or data erasure. Only these three methods will ensure complete data erasure.
Jul 03, 2020
Did you know that when you delete files from your computer, they can still remain on your hard disk? In many cases, deleted files can be recovered with little effort because most computer operating systems will only delete links to
May 23, 2020
Whether you consider your own confidential business data or data about your customers or users, at some point it will be required that data to be deleted.