40% of Discarded Digital Devices Contain Personal Data40% of Discarded Digital Devices Contain Personal Data
NAID study of 250 devices in resale markets found tablets contained the most recoverable personal information.
March 27, 2017
An eye-opener of a study by the National Association for Information Destruction (NAID) has found that 40% of digital devices available in second-hand markets for resale carry personal identifiable information (PII) unintentionally left behind by the user. Of the over 250 devices examined, tablets contained 50% of recoverable PII; hard drives, 44%; and mobile phones, 13%.
According to John Benkert of CPR Tools, whose firm was commissioned to conduct the research: "Auction, resell, and recycling sites have created a convenient revenue stream in used devices; however, the real value is in the data that the public unintentionally leaves behind."
Recovered data, from devices used in both commercial and personal environment, include usernames and passwords, credit card information, and company and tax details.
Interestingly, the researchers used very basic methods to recover the stored data and came up with this figure. "Imagine if we had asked our forensics agency to actually dig," says Robert Johnson of NAID. "40 percent is horrifying when you consider the millions of devices that are recycled annually."
Read full story here.
About the Author(s)
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report