![]() Software erasure methods leave large quantities of data recoverable from hard disks, making them inadequate when businesses want to fully erase data. Software wipes have been definitely rejected by government agencies that handle sensitive data, and with good reason. “Software erasure methods leave large quantities of data recoverable from hard disks.”Īccording to the news source, it is not only worth noting that the method is no longer in use, but also important to recognize that software-based data wipes are no longer considered acceptable by these agencies. It is a dated method that, according to a Lifewire report, is no longer permitted by the DoD, Department of Energy, Central Intelligence Agency or Nuclear Regulatory Commission. While the DoD 5220.22m Wipe has emerged as a popular solution, it was originally created by the National Industrial Security Program, and it was revised back in 2006. ![]() That final point is absolutely critical, as the DoD 5220.22m Wipe is not considered a secure way to erase data and adequately protect that information. The DoD 5220.22m Wipe solution, a method that wipes data by changing the configuration of zeros and ones stored on a device, has long been treated as a secure method to erase data from a hard disk that you want to use for another purpose. Software wipes aren’t up to modern demands Three lessons we can learn from the DoD and NSA are:ġ. Department of Defense and National Security Agency are two such bodies, and their various regulatory documents and rules provide key guidance on data sanitization best practices. The good news for businesses is that plenty of other organizations have been wrangling with some of these problems, and some of the entities handling the most sensitive types of data have developed formalized standards for data sanitization and destruction. ![]() Data sanitization, though simple on the surface, actually presents a variety of wrinkles and nuances that must be seriously considered as organizations evaluate what they need to do to keep data safe through proper destruction.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |