J
Jarryd
Hi,
I am getting more and more concerned about chucking away old machine that
might have sensitive data on them. Currently, when I am going to chuck away
a PC that has a HDD in it I beat the hell out of it with a hammer, after
performing a low-level format on it. But I know that this doesn't really
guarentee that all the data is wiped. To be honest, I am probably stressing
over nothing. I mean, who the hell is going to go to great lengths to
recover data belonging to my company from a banged up HDD all set to zeros.
But then I thought I might as well CMA (as opposed to CYA) and check if it
has gotten easier for techno-crooks to get at data since I last checked, and
if so what new methods / tools have been developed to safeguard against it.
There are loads of tools out there and I can't work out if I need to pay for
something or if I can use a freebie, and if I do have to pay for something
then what do I need to look out for?
CIA,
Jarryd
I am getting more and more concerned about chucking away old machine that
might have sensitive data on them. Currently, when I am going to chuck away
a PC that has a HDD in it I beat the hell out of it with a hammer, after
performing a low-level format on it. But I know that this doesn't really
guarentee that all the data is wiped. To be honest, I am probably stressing
over nothing. I mean, who the hell is going to go to great lengths to
recover data belonging to my company from a banged up HDD all set to zeros.
But then I thought I might as well CMA (as opposed to CYA) and check if it
has gotten easier for techno-crooks to get at data since I last checked, and
if so what new methods / tools have been developed to safeguard against it.
There are loads of tools out there and I can't work out if I need to pay for
something or if I can use a freebie, and if I do have to pay for something
then what do I need to look out for?
CIA,
Jarryd