Is physical data destruction completely secure?

Cybersecurity is a paramount issue facing businesses in the digital world. The average costs of a successful cybercrime in 2017 were roughly $1.3 million for large enterprises and $117,000 for small- to medium-sized businesses, according to Kaspersky Lab. These figures include the cost of data theft but do not encompass the additional potential price of a damaged reputation and ensuing legal action. Data also indicates that cyberattacks will become only more expensive and damaging in the coming years.

Defending an organization against cybercrime requires a multi-channel approach. Companies should be open to software solutions, employee training and hardware upgrades whenever necessary. However, another avenue for cybercrime is occasionally overlooked. Physical theft of connected mobile devices, laptops and even desktop computers can lead to an open pathway for cyberattacks. In addition, some businesses simply sell their used electronics without first doing a proper data cleanse.

But can information to completely and permanently removed from a hard drive?

Hard drives are traditional data collection units that can be altered in a number of ways. However, the question is "can data be permanently removed."Hard drives are traditional data collection units that can be altered in a number of ways. However, the question is “can data be permanently removed?”

The levels of data destruction
Deleting data is not as secure as some might assume. In actuality, when information on a computer is “deleted,” the files themselves are not immediately removed. Instead, the pathing to that information is expunged. The data is also designated as open space, so the computer will eventually overwrite it. However, until this rewrite occurs, it is relatively easy for the information to be restored and accessed by any tech-savvy user.

Fortunately for organizations trying to permanently dissolve their data, deletion is only the first step of the process. Lifewire recommended three additional methods to ensure that information remains lost.

First comes software – using a data destruction program on the hard drive. This method has been met with approval from the National Institute of Standards and Technology as a secure way to permanently remove information from a hard drive, according to DestructData. However, drawbacks include resource consumption, as this can be a time-intensive process. In addition, some overwriting tools can miss hidden data that is locked on the hard drive.

The most secure method to completely remove data is degaussing. Hard disk drives operate through magnetic fields, and degaussers alter those waves. The result is a drive that can never be read again. In fact, the computer will not even register it as a hard drive from that moment on. However, the downside in this process is twofold: One, the drive is useless after degaussing. Two, this method can on only hard disk drives. Solid state drives and flash media do not use magnetism in the same way, so a degausser will be ineffective.

The final option is to physically destroy the data drive. While many people think that this task can be done with patience and a hammer, it is unfortunately not that simple. Hard drives can be rebuilt with the right tools and expertise. According to the Computer World, NASA scientists were able to recover data from the charred wreckage of the Columbia shuttle after its disastrous explosion and crash in 2003.

Computers that are simply thrown out can still possess classified data, which can return to haunt the company.

The resiliency of hard drives
In short, it can be difficult to permanently expunge data from a hard drive. This reality is in part why businesses are opting for less internal data centers and more dependency on cloud solutions. According to TechTarget, cloud solutions represent a more secure method of data organization than traditional IT infrastructure.

While data can be safely deleted, the reality is, unless a degausser is used, there is always some chance of information recovery. Cybercriminals are becoming more sophisticated, and given the expensive nature of dealing with data breaches, it is understandable why the cloud is becoming the preferred solution.

Webinar: Beating Burnout & Boosting Business Continuity

It’s an unfortunate truth that many IT departments have recently faced cuts. Yet the expectations of keeping systems running and overall business continuity intact have not. In fact, it’s even more important today than ever before.

How do you balance this tug-of-war for time and resources, while spread so thin?

In this webinar, Rick Vanover, Senior Director of Product Strategy from Veeam Software, will leverage his 20+ years in data protection and business continuity to help you navigate this challenge.

What You’ll Learn:

  • The latest business continuity challenges you should be prepared for
  • How to do more with what you already have
  • How to provide extra levels of data protection and disaster recovery with ease
  • 6 best-in-class data protection practices
  • How ISG + Veeam help

Who Should Watch?

Business and IT leaders who are responsible for business continuity, disaster recovery and data protection.

ISG Named Veeam Accredited Service Partner

Local technology provider recognized for excellence in technical knowledge

OVERLAND PARK, Kan., Aug 7, 2020 – ISG Technology, a Managed IT Services Provider, announced its status as a Veeam® Accredited Service Partner (VASP) – a program that identifies, recognizes and promotes business partners for their excellence in technical knowledge and practical implementation skills. ISG is also among select partners with dual Platinum status as a Veeam Reseller and Veeam Cloud & Services Provider (VCSP) partner. The addition of participation in the VASP program makes ISG one of the deepest technical benches of any Veeam partner.

Veeam Software, the leader in Backup solutions that deliver Cloud Data Management™, uses the VASP program to identify IT consultants who possess the technical skills to deliver value-added and reliable professional services for Veeam product portfolio implementations. The program promotes the expertise and technical competency of these partners at full benefit of their customer base – offering the best of breed in terms of service delivery.

At its core, the program is designed to:

  • Ensure that Veeam customers experience the full value and return on investment of Veeam solutions by working with highly skilled technical partners and professionals.
  • Ensure that Veeam customers receive high-quality professional services in accordance with Veeam’s current technical best practices.
  • Create an exclusive business differentiator for service providers that acknowledges their expertise and technical capabilities related to Veeam solutions.

To qualify for the VASP program, ISG demonstrated significant experience in delivering  professional services around Veeam solutions with an existing professional services department, and dedicated staff and company resources.

“We are honored and excited to become a Veeam Accredited Service Provider,” said ISG President & CEO Ben Foster. “With more companies moving to a remote workforce, and security threats on the rise, data protection has never been more important. Strengthening this partnership allows us to better serve the data availability needs of the market.”

In addition to enhanced marketing and enablement support, ISG as a VASP program member provides numerous benefits to help serve its customers:

  • Dedicated training opportunities
  • Enablement, advisership and delivery support
  • Priority and dedicated access to Veeam subject matter experts
  • Access to exclusive technical tools for implementations
  • Access to senior pre-sales resources for technical advisory
  • Access to the Veeam Technical Library of best practices
  • Veeam Partner Professional Services learning plan
  • Access to an exclusive Veeam consultant hotline during customer implementations

“With their certification in the Veeam VASP program, ISG has one of the most complete portfolios of Veeam products and services in North America,” said Nikki Jennings, Vice President of Americas Channel Engineering at Veeam.  “As a Platinum VCSP, a Platinum Reseller, and now an accredited VASP professional services partner, ISG is fully equipped to deliver all Veeam Could Data Management solutions, with any service necessary, to enable and support unprecedented data management outcomes for our joint customers.”

As a leading Managed Services Provider throughout the region, ISG Technology offers its clients strategic technology solutions with a local feel and a personal approach to IT. Now in the fourth generation as a family business, the companies boast Midwest roots with locations in Kansas, Oklahoma and Missouri – with clients from all over the nation.

Want to know more about how ISG and Veeam can help you take your business to the next level?  Contact us today.

Be sure to join our upcoming three-part webinar series, for technology visionaries who understand the importance of security and business continuity in the new world.

Webinar: Data Protection Fundamentals To Strengthen Your Cybersecurity Strategy

The tournament may be crazy. But what’s crazier is the number of businesses that don’t have a solid cybersecurity strategy. That’s why we’re dedicating the month of March to helping as many organizations as we can strengthen their defense against modern security threats. We call it Security Madness.

In this webinar, you’ll learn the latest security landscape and current concerns, how to utilize the NIST Security Framework in your security strategy , how data backups fit into your security strategy and five steps to keeping your systems protected.

Client Testimonial: Freddy’s Frozen Custard

Technology partnership helps fuel the growth of Freddy’s Frozen Custard

Industry: Food & Beverage
Client: Freddy’s Frozen Custard

In Partnership with

THE CHALLENGE

Enlisted by Freddy’s, ISG was tasked with transitioning the client’s infrastructure to a more secure and flexible system. The initial findings highlighted a few opportunities:

  • Evaluated the health of the client’s network security to find at risk data. If a server were to fail under the original network system, data would have been lost and unrecoverable.
  • Discovered the company was poised for growth, but infrastructure was unable to keep up with needs and goals.
  • Determined the transition to the new network had to take place outside of business hours.

 

THE SOLUTION

  • Utilized leading backup solution to migrate the company’s data to the cloud
  • Migrated an aging small business server to a updated and upgraded exchange server
  • Provided an internal SQL consultation
  • Deployed Cisco Meraki Technology across locations

 

RESULTS

Freddy’s is now ready for tremendous future growth with the flexibility and security of ISG’s cloud solution with our straightforward approach to implementation and willingness to execute outside of business hours, ensuring both client satisfaction and business success.