Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

10/9/2015
03:25 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Data Deletion: A Disconnect Between Perception And Reality

Study shows that methods used to erase data before equipment is resold not as effective as assumed.

Several techniques used by businesses and individuals to purge mobile devices, laptops, and storage devices of data before disposing of them are not as effective as imagined.

Methods like formatting the hard disk, using file deletion commands, and manual data deletion often leave a dangerous amount of residual data on a system, contrary to what the device owners might assume, according to the findings of a new Blancco Technology Group and Kroll Ontrack study on the effectiveness of data deletion methods in systems resold online.

The findings are no surprise, says Paul Henry, an IT security consultant at Blancco, but they underscore the continuing disconnect that exists between perception and reality when it comes to proper data deletion.

Many businesses and individuals still don't fully understand data erasure methods and end up leaving behind residual data on systems they resell, he says.

Enterprises that take a lax approach and fail to monitor how, when, and where all of the data from their equipment is removed before it’s discarded, reused, or recycled, are exposing themselves to trouble. “If they fail to obtain actual verification that all data has been removed permanently, it’s simply irresponsible and can cause serious financial, legal, and reputational damage,” Henry says.

Kroll and Blancco purchased a total of 122 used hard disk drives, mobile devices, and solid state drives from eBay, Amazon.com, and Gazelle.com and examined them for traces of residual data. The review showed that 48%—or nearly half—of the hard disk drives and solid state drives had residual data on them, including personal and work emails, business presentations, and other documents.

Similarly, about 35% of the mobile devices examined had residual data on them, including leftover emails, texts, SMS, instant messages, and call logs. Researchers who conducted the study were able to retrieve over 2,150 emails as well as 10,838 text, SMS, and instant messages. In a handful of cases, the devices contained video as well.

Interestingly, attempts had been made to wipe data in 75% of the hard disk and solid state drives found with residual data. Around 57% of the mobile devices with residual data showed that a similar attempt to clean the devices had been made before they were sold.

The numbers show that a majority of those selling used computers, hard drives, and mobile devices online are making an attempt to clean the equipment first, but are not entirely successful in achieving that goal.

In the case of hard drives, 61% of the sellers used quick formatting, about 14% favored reformatting their drives, while 11% employed either a random data overwrite or a basic delete. About 3% of the sellers reinstalled their software in an apparent attempt to delete data.

With the exception of random overwrites, none of the other approaches were successful in getting rid of all the data on the devices. Sellers who used the random overwrite method were the only ones successful in completely wiping their devices clean of residual data.

The mobile devices that were studied, meanwhile, showed that the sellers had attempted to manually delete data on their systems or had simply logged out of their applications in an attempt to erase data. But such actions only make the task of finding the data on the device harder. They do not completely erase the data, the study by Kroll and Blancco noted. 

Resetting the device to its default, factory settings can be effective, but not in all cases, the report added.

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
TejGandhi1986
50%
50%
TejGandhi1986,
User Rank: Apprentice
10/9/2015 | 10:17:22 PM
Completely deleting the data or wiping out the data is very difficult ,degaussing cann be one of the way to completely delete oo
Completely deleting the data or wiping out the data is very difficult ,degaussing can be one of the way to completely delete off data.

 

Data remains on the system even after deletion and an effective tool can pull out deleted data.Overwritting the data multiple times can be one of the way to delete data completely.

 

Thanks

Tej Gandhi
TejGandhi1986
50%
50%
TejGandhi1986,
User Rank: Apprentice
10/9/2015 | 10:17:20 PM
Completely deleting the data or wiping out the data is very difficult ,degaussing cann be one of the way to completely delete oo
Completely deleting the data or wiping out the data is very difficult ,degaussing can be one of the way to completely delete off data.

 

Data remains on the system even after deletion and an effective tool can pull out deleted data.Overwritting the data multiple times can be one of the way to delete data completely.

 

Thanks

Tej Gandhi
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
CVE-2021-31660
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.