How to Securely Dispose of Old Computers
Getting new computers for your business is exciting, but what happens to the old ones? Depending on the age, some people sell them, others throw them out. Thatโs the easy part. The problem is the sensitive data on them. There are passwords, account numbers, license keys, customer details, medical information, tax returns, browser historyโฆ. the works! Each computer, whether laptop, tablet or desktop, contains a treasure trove of sensitive information that cybercriminals would love to get their hands on.
Unfortunately, hitting delete on your files doesnโt actually make them disappear, nor does waving a strong magnet over the drive. These mistakes have cost businesses millions of dollars over the years.
Most businesses are unaware that specialized data cleanup is necessary, others think calling someone to collect the computers will cover all the bases. A 2016 experiment proved just how dangerous the situation can be when they bought 200 used hard drives and found 67% held unwiped, unencrypted sensitive data, including sales projection spreadsheets, CRM records, and product inventories. Frighteningly, they didnโt need any special hacking skills to get this data, it was all right there and helpfully labelled. Itโs also not surprising that with simple data recovery tools, people have also been able to access British NHS medical records and missile data, all waiting patiently on a discarded hard drive.
Why hitting delete doesnโt help
Data on a hard drive works like a book with an index page. Every time data is written, it pops a quick entry into the index so when you need it again, it knows where to look. The index is used for files you create as well as system files you canโt even see. Sensible, right? Except if you delete a file itโs more like changing the index to say nothing is on page 10 and you can write something else there when youโre ready. But if you manually flip to page 10, youโll find the information is still there โ the file still exists until itโs been written over โ itโs the index reference that got deleted.
Wiping data before disposal
There are software tools you can get to do it yourself, as well as dedicated security firms, but your best option is to choose an IT business you know and trust. With that in mind, a methodical approach is required to ensure not a single drive is left untreated. You donโt want to leave data behind, or even clues that a motivated person could extrapolate any private information from. The approach might include using checklists to maintain security, or dedicated processes to guide each step in decommissioning. Careful records should also be kept, including who signs off on completion of the retirement, and where the computers are sent afterwards. A proper inventory and auditing process may slow the rollout of the new computers slightly, but itโs always better than having your old data come back to haunt you.
We can migrate any needed data, backup the information to your server or external drive, then wipe or destroy the hard drives for you. We can assess the age of your old computers and either dispose of them for you or point you in the right direction of computer recyclers. Plus, the quicker you dispose of your old computers, the easier the process will be. Recyclers will be able to send less of your equipment to landfill, and youโll be less likely to forget how valuable the drive contents are.
Upgrading your business computers should be a happy time for you and your employees, so with a little forward planning, youโll be able to keep everyone smiling and all your data secure.
Need help with your old hardware? Call us today at (615) 522-0080
Safe Network Solutions is a technology consulting firm located in Nashville, TN. We are focused on reducing our Clientsโ stress and the time they spend handling IT related issues. As technology has become more integrated with daily business tasks, downtime is not an option. Whether your systems reside on-premise, in the cloud, or in a hybrid setup, you need a partner with expertise in a wide array of technologies, with a security focus.