Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Who Killed My Hard Drive?

University study examines the causes and costs of hard drive failure

You've heard the threat before: A virus or Trojan could infect your PCs and wreck their hard drives. But how often does it really happen -- and how bad is the damage?

A new university study suggests that hard-drive-killing attacks launched by hackers are actually pretty rare -- but when they do occur, they can be more costly than most companies think.

The study, published last quarter by professors at the University of Pepperdine and commissioned by data recovery vendor Deepspar Technologies, looks at the causes of hard drive failure and offers insights on just how "fatal" a fatal drive error can be.

Aside from physical theft, hard drive failure is the most common cause of data loss on PCs, the study says, accounting for 38 percent of data loss incidents. In about 30 percent of these cases, the loss of access is the result of drive problems, where corruption of the media makes the data unreadable.

Software corruption, which is the usual path used by hackers and viruses to "crash" a hard drive, only causes data loss in about 13 percent of cases, according to the study. Such incidents are only slightly more frequent than drive losses caused by human error (12 percent), the study says.

But while remote attacks may cause fewer drive crashes than many users believe, the cost of those crashes may be higher than many executives expect, the study states.

The IT costs associated with a drive failure are fairly easy to measure, the study says. In cases where the data can be restored by an in-house staffer -- which happens about 40 percent of the time -- the cost is about $350. If the drive has to be sent out to a recovery service, the cost is around $1,500. On average, then, the IT cost of a failed drive is about $1,150, the study says.

But many companies fail to factor in the cost of lost productivity, the study observes. If you add up the average time it takes to restore data on a failed drive and multiply it by the cost of the employees affected, there is a lost productivity cost of about $1,750 per drive failure, the researchers say. And if you add productivity costs to IT costs, the average drive failure cost is about $2,900 -- assuming you can recover the data from the damaged drive at all.

If a hacker or virus does successfully crash a hard drive, the study recommends caution in trying to recover the data internally. "Non-professional tools and system software (e.g., chkdsk) often fix errors by overwriting the file system on the drive," the study says. "Though this may repair the file system, it permanently destroys the data." About 15 percent of all non-recoverable data loss situations were created by prior non-professional data recovery attempts, the study says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Secure Computing Corp. (Nasdaq: SCUR)

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 4/10/2020
    Zscaler to Buy Cloudneeti
    Dark Reading Staff 4/9/2020
    Researcher Hijacks iOS, macOS Camera with Three Safari Zero-Days
    Kelly Sheridan, Staff Editor, Dark Reading,  4/3/2020
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Write a Caption, Win a Starbucks Card! Click Here
    Latest Comment: Yes, I do have virus protection on my system, now what?
    Current Issue
    6 Emerging Cyber Threats That Enterprises Face in 2020
    This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
    Flash Poll
    State of Cybersecurity Incident Response
    State of Cybersecurity Incident Response
    Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2020-04-10
    An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd.
    PUBLISHED: 2020-04-10
    There is an improper authentication vulnerability in several smartphones. Certain function interface in the system does not sufficiently validate the caller's identity in certain share scenario, successful exploit could cause information disclosure. Affected product versions include:Mate 30 Pro vers...
    PUBLISHED: 2020-04-10
    Under certain conditions, vmdir that ships with VMware vCenter Server, as part of an embedded or external Platform Services Controller (PSC), does not correctly implement access controls.
    PUBLISHED: 2020-04-10
    IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 traditional is vulnerable to a privilege escalation vulnerability when using token-based authentication in an admin request over the SOAP connector. IBM X-Force ID: 178929.
    PUBLISHED: 2020-04-10
    There is an insufficient integrity validation vulnerability in several products. The device does not sufficiently validate the integrity of certain file in certain loading processes, successful exploit could allow the attacker to load a crafted file to the device through USB.Affected product version...