<img src="https://secure.leadforensics.com/32105.png" style="display:none;">

Personal information found on 1 in 10 reused hard drives

 

A study by the UK's Information Commissioner's Office (ICO) has found that 11% of reused hard disk drives contain sensitive personal information about their previous owners.

Hard disk drives (HDDs) are present in most computers and are used for storing and accessing digital information. What many people don't know is that when a file is deleted from a hard drive, it isn't actually deleted, only the visible link to it is removed. Even when the recycle bin is emptied a recoverable imprint of the file remains.

 

Bang Goes the Theory

A recent test by the BBC's Bang Goes The Theory team found that even after some pretty destructive experiments data was often still recoverable on hard drives. You can check out the Bang website for further information.

 

What does it mean for you?

You should be aware that personal information will be present on your computer's hard drive, and that you should take steps to properly erase it if you intend to sell or dispose of your computer.

Don't assume that deleting that Word document you used to save passwords, emptying the recycle bin, formatting your computer or resetting it to factory defaults will actually remove anything. It won't; there will still be a recoverable imprint of your data on the hard drive.

What you can do to protect yourself

The bullet-proof method of deleting personal information is to physically destroy the hard drive. However, the more practical solution for the average person is to use secure data removal software.

Programs such as CCleaner and Eraser work by overwriting the original hard drive information many times, eventually removing the traces. They do not require the dismantling of the computer, nor expert knowledge. At their maximum security setting they can take a very long time to delete all your data, the benefit being that once complete it will be virtually impossible for your personal information ever to be recovered.

Following on from their study, the UK's Information Commissioner's Office have also published their own guidelines on how to securely delete information.

 

Further Reading

Back to Blog

Related Articles

My1Login has been named a finalist for IAM in two Awards

My1Login has been named a finalist for its Identity and Access Management solution at both the Computing Security Awards and the Computing Security Excellence...

Cybersecurity Myths Still Believed In 2022

The nature of the threat landscape posed by cybercriminals to organisations is far from static, and both the techniques employed by attackers and the methods used...

Single Employee Credential Wreaks Havoc For US-based, Cyber Vendor

You may have seen in the press this week that a major, US-based, cyber security vendor fell victim to a data breach. This particular breach involved compromised...