Think Before You Toss: Symantec Security Tips On Computer Disposal
Getting rid of old computers gets trickier every day. A Symantec podcast offers three minutes' worth of good advice on how to do so safely.
Getting rid of old computers gets trickier every day. A Symantec podcast offers three minutes' worth of good advice on how to do so safely.I've talked a lot here about the persistence of data -- whatever you think you may have gotten rid of, you may not have.
A small and midsize business podcast on this subject from Symantec offers some important, general reminders on what to do before you ditch that PC, notebook or handheld device.
The podcast, How To Properly Discontinue The Use of Old Computers (available here) is good on the discontinue portion of the process, particularly the importance (overlooked more often than you might think) of insuring that all the information you need from the old machine has been replicated elsewhere.
Bearing in mind that the 'cast is only three minutes long, and of necessity very general, I'd still take some issue with the security company's perspective on wiping the disk clean of data. Symantec is of course correct about not relying the operating system's delete or desktop trashcan functions to remove sensitive information.
Likewise bearing in mind that Symantec offers disk-wipe solutions among its security and utility suites -- and the podcast is admirably low-key about pushing them -- I'd still argue that the safest way to dispose of a computer is to do so after removing the hard disk after you've wiped it clean.
And, once removed, either physically destroy, melt, disintegrate or otherwise end its existence, or store it with other data-bearing disks whose hardware homes have been gotten rid of.
Belt and suspenders? Yep -- overkill, sure, but you won't be caught with your pants down.
Nice that Symantec suggests donating cast-off computers to worthy causes or, if the junk heap is where they're headed, recommends environmentally friendly, green disposal. Here are some computer recycling sources bMighty's readers recommend.
About the Author
You May Also Like
A Cyber Pros' Guide to Navigating Emerging Privacy Regulation
Dec 10, 2024Identifying the Cybersecurity Metrics that Actually Matter
Dec 11, 2024The Current State of AI Adoption in Cybersecurity, Including its Opportunities
Dec 12, 2024Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024