Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

Who Killed My Hard Drive?

University study examines the causes and costs of hard drive failure

You've heard the threat before: A virus or Trojan could infect your PCs and wreck their hard drives. But how often does it really happen -- and how bad is the damage?

A new university study suggests that hard-drive-killing attacks launched by hackers are actually pretty rare -- but when they do occur, they can be more costly than most companies think.

The study, published last quarter by professors at the University of Pepperdine and commissioned by data recovery vendor Deepspar Technologies, looks at the causes of hard drive failure and offers insights on just how "fatal" a fatal drive error can be.

Aside from physical theft, hard drive failure is the most common cause of data loss on PCs, the study says, accounting for 38 percent of data loss incidents. In about 30 percent of these cases, the loss of access is the result of drive problems, where corruption of the media makes the data unreadable.

Software corruption, which is the usual path used by hackers and viruses to "crash" a hard drive, only causes data loss in about 13 percent of cases, according to the study. Such incidents are only slightly more frequent than drive losses caused by human error (12 percent), the study says.

But while remote attacks may cause fewer drive crashes than many users believe, the cost of those crashes may be higher than many executives expect, the study states.

The IT costs associated with a drive failure are fairly easy to measure, the study says. In cases where the data can be restored by an in-house staffer -- which happens about 40 percent of the time -- the cost is about $350. If the drive has to be sent out to a recovery service, the cost is around $1,500. On average, then, the IT cost of a failed drive is about $1,150, the study says.

But many companies fail to factor in the cost of lost productivity, the study observes. If you add up the average time it takes to restore data on a failed drive and multiply it by the cost of the employees affected, there is a lost productivity cost of about $1,750 per drive failure, the researchers say. And if you add productivity costs to IT costs, the average drive failure cost is about $2,900 -- assuming you can recover the data from the damaged drive at all.

If a hacker or virus does successfully crash a hard drive, the study recommends caution in trying to recover the data internally. "Non-professional tools and system software (e.g., chkdsk) often fix errors by overwriting the file system on the drive," the study says. "Though this may repair the file system, it permanently destroys the data." About 15 percent of all non-recoverable data loss situations were created by prior non-professional data recovery attempts, the study says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

  • Secure Computing Corp. (Nasdaq: SCUR)

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Commentary
    Ransomware Is Not the Problem
    Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
    Edge-DRsplash-11-edge-ask-the-experts
    How Can I Test the Security of My Home-Office Employees' Routers?
    John Bock, Senior Research Scientist,  6/7/2021
    News
    New Ransomware Group Claiming Connection to REvil Gang Surfaces
    Jai Vijayan, Contributing Writer,  6/10/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: Google's new See No Evil policy......
    Current Issue
    The State of Cybersecurity Incident Response
    In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
    Flash Poll
    How Enterprises are Developing Secure Applications
    How Enterprises are Developing Secure Applications
    Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2021-24368
    PUBLISHED: 2021-06-20
    The Quiz And Survey Master – Best Quiz, Exam and Survey Plugin WordPress plugin before 7.1.18 did not sanitise or escape its result_id parameter when displaying an existing quiz result page, leading to a reflected Cross-Site Scripting issue. This c...
    CVE-2021-31664
    PUBLISHED: 2021-06-18
    RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
    CVE-2021-33185
    PUBLISHED: 2021-06-18
    SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
    CVE-2021-33186
    PUBLISHED: 2021-06-18
    SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
    CVE-2021-31272
    PUBLISHED: 2021-06-18
    SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.