Why is it important to understand the difference between data destruction and data erasure?

Tips and Tricks

May 03, 2021

Haseeb Jamshed

ITAD specialist

The option to leave your cellphone with or without a lock screen pin-code is a thought rarely pondered upon by most smartphone users. It is a no-brainer for any individual since privacy is a top priority when it comes to protecting sensitive data (contacts, payment history, financing apps, location services, and more) that could potentially harm them if it falls into the wrong hands. Apply the same concern to an organization or business, the magnitude of the risk skyrockets.

This is not just paranoia but an actual concern. To put things into perspective an entire school district in the United States was a victim of ransomware attacks that lead to all schools being shut down in the year 2020. The data must be either secured actively if it is in use or must be destroyed if the data is no longer of use and is a potential liability for the owner.

Data destruction and data erasure processes come into effect when the target data is no longer of use and has become a potential liability for the owner. Like any process both routes to make your data have their pros and cons.

Data destruction processes are to either physically destroy the media containing the target data or to render it useless for access. this method guarantees the highest probability of the data being irrecoverable and unaccusable but also renders the device to be incapable of being used again or to be warranted/recycled. Some of the prominent methods are:

  1. Melting/hammering/drilling/crushing.
  2. Data Shredding is the physical destruction of a target data media in an industrial size grinder that breaks it down into fragments smaller than 2 millimeters or less. It is to be noted that the probability of accessing destroyed data is still there. Drives such as the Solid-State Drives (SSDs) where data is stored so densely that it can remain intact in shredded fragments.
  3. Degaussing: is the removal or reduction of the magnetic field of a storage disk or drive. degausser devices render the data on the media completely unrecoverable.

Data Erasure is a term interchangeably used with the term data sanitization. This method of eliminating liability data ensures that the target data is destroyed or unrecoverable completely and keeps target data’s media intact. Methods for data sanitization are:

  1. Data Erasure: Applies software that writes a random binary script that replaces data on the media completely ensuring that all the data has been replaced at the byte level completely.
  2. Cryptographic Erasure: uses public-key cryptography to encrypt all the data on the device and then the key is discarded, effectively erasing all data on the media.
  3. Data Masking: Involves creating fake versions of the data, which retain structural properties of the original data. This method ensures the sanitization of data while the media is still in use.

 

Briefly understanding both methods to secure data that is a liability to the owner the importance of having both options amplify themselves. While physical data destruction has a higher probability of making the data inaccessible it renders the media useless making it only suitable to be trashed or recycled. Physical data destruction can be a costly method depending on which method is being used. Degaussers are expensive devices and if the target data is stored on multiple units, then shredding becomes a tedious process that can also present multiple risk during the process. Data erasure method are more costly than data destruction methods but make up for their cost by making the media usable again. This method also presents itself as a double-edged blade considering the data erasure methods are 100% effective but can only be applied to devices that are in working condition and that are compatible with the software being used. The decision to use which method depends mainly on what is to be done with the media of the target data. To destroy or not to destroy that is the final question.

 

Tips and Tricks

May 03, 2021

Why is it important to understand the difference between data destruction and data erasure?

Haseeb Jamshed

ITAD specialist

The option to leave your cellphone with or without a lock screen pin-code is a thought rarely pondered upon by most smartphone users. It is a no-brainer for any individual since privacy is a top priority when it comes to protecting sensitive data (contacts, payment history, financing apps, location services, and more) that could potentially harm them if it falls into the wrong hands. Apply the same concern to an organization or business, the magnitude of the risk skyrockets.

This is not just paranoia but an actual concern. To put things into perspective an entire school district in the United States was a victim of ransomware attacks that lead to all schools being shut down in the year 2020. The data must be either secured actively if it is in use or must be destroyed if the data is no longer of use and is a potential liability for the owner.

Data destruction and data erasure processes come into effect when the target data is no longer of use and has become a potential liability for the owner. Like any process both routes to make your data have their pros and cons.

Data destruction processes are to either physically destroy the media containing the target data or to render it useless for access. this method guarantees the highest probability of the data being irrecoverable and unaccusable but also renders the device to be incapable of being used again or to be warranted/recycled. Some of the prominent methods are:

  1. Melting/hammering/drilling/crushing.
  2. Data Shredding is the physical destruction of a target data media in an industrial size grinder that breaks it down into fragments smaller than 2 millimeters or less. It is to be noted that the probability of accessing destroyed data is still there. Drives such as the Solid-State Drives (SSDs) where data is stored so densely that it can remain intact in shredded fragments.
  3. Degaussing: is the removal or reduction of the magnetic field of a storage disk or drive. degausser devices render the data on the media completely unrecoverable.

Data Erasure is a term interchangeably used with the term data sanitization. This method of eliminating liability data ensures that the target data is destroyed or unrecoverable completely and keeps target data’s media intact. Methods for data sanitization are:

  1. Data Erasure: Applies software that writes a random binary script that replaces data on the media completely ensuring that all the data has been replaced at the byte level completely.
  2. Cryptographic Erasure: uses public-key cryptography to encrypt all the data on the device and then the key is discarded, effectively erasing all data on the media.
  3. Data Masking: Involves creating fake versions of the data, which retain structural properties of the original data. This method ensures the sanitization of data while the media is still in use.

 

Briefly understanding both methods to secure data that is a liability to the owner the importance of having both options amplify themselves. While physical data destruction has a higher probability of making the data inaccessible it renders the media useless making it only suitable to be trashed or recycled. Physical data destruction can be a costly method depending on which method is being used. Degaussers are expensive devices and if the target data is stored on multiple units, then shredding becomes a tedious process that can also present multiple risk during the process. Data erasure method are more costly than data destruction methods but make up for their cost by making the media usable again. This method also presents itself as a double-edged blade considering the data erasure methods are 100% effective but can only be applied to devices that are in working condition and that are compatible with the software being used. The decision to use which method depends mainly on what is to be done with the media of the target data. To destroy or not to destroy that is the final question.

 

Suggested articles

Smart Phones & Device

May 16, 2018

Broken phone? Don’t break your bank – Get it Repaired!

Many of us cannot imagine spending a day without our cell phones. However, it is not uncommon for people to accidently drop their phones which leads to damage on the phone rendering it useless. Based on research conducted by Unduit Wireless, on average every person in United States needs a phone repair once every fourteen (14) months. It is also true that many people prefer to buy a new cell phone after the old phone is damaged but surprisingly, the real reason is not the cost of repair but not having quick access to low cost and trust worthy repair services provider. In this day and age all of us have so much personal data on our phones from pictures to emails to financial data. Trusting a repair service with our devices is especially hard when it comes to cell phone repairs. And yes, giving full access to any repair tech does raise all kinds of alarms. Apple care can be a viable option, but in most cases, that can be a costly endeavour and wait times in most Apple shops can be quite discouraging. In another user survey Unduit Wireless found that 2/5 working professionals living in Chicago city had a broken phone in their drawers. And the primary reason for not getting repairs was lack of time. Annoyed by the unknown or daunting process to get repairs, a lot of customers decide to buy brand new phones. The good news is that there are services popping up where the users can get phone repairs done without leaving their doorstep. Yes! Talk about Uber of phone repairs. Such services offer the convenience of repairs at customers’ doorstep. The techs are background checked for safety. One big watch out while qualifying such services is to understand who will perform the repair on your phone. Most of such services partner with local freelancers who typically do not go through any formal training on device repairs. The risk in such repairs is that the device can be further damaged by the tech if the person is not experienced in repairs. Another issue with such services is the reliability factor to ensure the tech shows up within requested window. For most of such services, setting up an appointment for a same day repair is as easy as filling out information on a few forms. Unduit Wireless, a major player in on-demand repair services makes it real easy for customers to request available timeslot. An example is the following link (www.unduitwireless.com/ondemand) where customers can request a repair timeslot in just a few steps and less than two minutes. Once the request is submitted, the tech shows up at the time and place of customer’s choosing. Most of Unduit Wireless customers get phone repairs while getting a cup of coffee at local coffee shop, their home or at their offices. Most repairs take less than 30 minutes and almost all of the customers are pleasantly surprised to see how painless and convenient such repair process can be. Here are a few more reasons why mobile repair is the best option: 1. Cost Buying a new cell phone is definitely more expensive than repairing cell phone or tablet. Most repairs cost less than a $100 while a new device can easily cost north of $700, depending on the phone model and the contract. So why break the bank to repair a broken phone. Doesn’t sound smart! Does it? 2. Lifetime Warranty Most quality on-demand repair services provide Lifetime Warranty on parts and labor. The industry is currently going through massive transformation and warranty is one of the key benefits for customers which assures that the repair provider guarantees their work. Do not give your business to companies that are not willing to stand by their work and only offer limited warranty 3. Convenience Buying a new cell phone would require to have data transferred from the old phone. If the old phone is faulty or malfunctioning, there is possibility of data loss which can be averted by repairs. At minimum, repair shops are able to retrieve data from broken devices. That’s a huge life saver! 3. Environment Recycling cell phones is a big win for our planet. Dead cell phones end up in ditches and the remains can last for years. Reusing cell phones to get the full life out of a device is not only cost effective but also keeps our planet from getting polluted. Yes, it’s a win win! Conclusion In conclusion, getting devices repaired is cheaper and environment friendly. With on-demand, Uber like repair providers, most repairs can be done without leaving our doorstep at or below the prices customers pay at local repair shop. This change in industry is welcoming and only plays to the benefit of customers. With devices such as phones and tablets, becoming an integral part of our lives, such services will only become a necessity for each one of us

Faiza Sabeen

ITAD specialist

Enterprise Mobility Management

July 04, 2018

Device Lifecycle Management: Its Importance & Everything Else

Device Lifecycle Management: Its Importance & Everything Else Device Lifecycle Management (DLM) is the process of managing the complete lifecycle of a device, from procurement to disposal. This includes all the activities in different phases: planning, acquiring, deploying, maintaining, and retiring devices. DLM is a crucial part of any organization's asset management strategy, as it helps to optimize the performance and costs of devices, while also ensuring compliance with relevant regulations. Businesses of all sizes can benefit from it by properly managing IT assets and can ensure that their IT infrastructure is up-to-date, secure, and cost-effective. As a complex process, it involves a variety of stakeholders, like procurement specialists, and finance teams, not just  IT professionals. With COVID and the shift towards remote working culture, the demand and challenges have skyrocketed and the complexity in DLM has further increased. This blog post will provide an overview of device lifecycle management, its importance, benefits, phases, and how to implement it properly in your organization in today’s world. Importance and Benefits of Device Lifecycle Management Device lifecycle management has fundamental importance for all types of enterprises, not just to manage mobile workforce productivity and reduce operational costs but to deliver more value to the customers. Better Tracking: Inventory Management and Device Health Having proper implementation for device management enables more visibility into inventory and device health. This can enable organizations to ensure that they have the right number and type of devices to meet their needs. And their devices are being used effectively and efficiently without any issues with the device's battery life, performance, and stability. Boost Productivity Across the Organization Device lifecycle management can improve end-user experience and organizational productivity by ensuring devices are up-to-date, and there are no disruptions preventing users to perform their core tasks. Take Security to the Next Level Device lifecycle management can help organizations to ensure that their devices are properly configured and secure. This can include installing security updates and patches, as well as enforcing strong passwords and other security measures. Mitigate Compliance Risks Device lifecycle management can help organizations to ensure that they are complying with relevant laws and regulations, such as those related to data privacy and the disposal of end-of-life devices. 6 Common Phases of DLM Planning This is the initial and pre-procurement phase of DLM, where an organization determines its device needs and creates a plan for acquiring and managing these devices. This may involve conducting a device inventory, analyzing usage patterns, and setting goals for the DLM program. Procurement In this phase, an organization acquires the devices that it needs, either by purchasing them outright or through a leasing arrangement. This may involve evaluating different vendors, negotiating contracts, and establishing payment terms. Deployment After the device provisioning phase, they need to be deployed to the appropriate users, or implemented in existing systems. This may involve configuring the devices, installing the necessary software, and providing training to users. Maintenance This phase involves ongoing efforts to keep the devices in good working order. This may include activities such as applying software updates, repairing or replacing damaged devices, and monitoring performance. Reporting The reporting phase of DLM involves collecting and analyzing data about the performance, usage, location, ownership, and status of devices. This information is used to inform decision-making and improve the efficiency of the cycle and significantly improve cost savings. Retirement Eventually, devices will reach the end of their useful life (EOL) and need to be retired. This phase involves decommissioning the old devices and disposing of them in an appropriate manner, which may include securely wiping data and properly disposing of the device in accordance with relevant regulations. It's important to note that DLM is an ongoing process, and these phases may overlap and occur multiple times throughout the lifecycle of a device. And the activities are not limited to the mentioned phases but also include enrolling in Mobile device management programs, installing security software, asset recovery, responsible disposal of the hardware and data, repair and refreshing of the devices, warehousing, and so on. Frequently Asked Questions (FAQs) What is the Difference between Device Lifecycle Management and Mobile Device Lifecycle Management? Both of these terms, DLM and MDLM are used interchangeably. Still, the main difference between them is Device lifecycle management covers all types of devices, including mobile devices, IoT, servers, printers, medical devices, and workstations. In contrast, mobile device lifecycle management is specific to mobile devices, tablets, and laptops. What are the common challenges associated with DLM implementation? Managing a diverse fleet of devices: As mentioned earlier, organizations may have a variety of different devices, including desktops, laptops, tablets, and smartphones, each with different requirements and capabilities. Managing such a diverse fleet can be complex and time-consuming. Ensuring compliance with laws and regulations: Organizations must comply with various laws and regulations in the different regions they operate in, and it can be challenging to develop processes. Keeping up with technological change: The technology landscape is constantly evolving, and IT managers must keep up with these changes to ensure that the organization's devices are current and effective. This can involve upgrading or replacing devices, which can be costly. Other common issues include but are not limited to: managing device security, maintaining budget constraints, dealing with end-of-life devices, handling hardware and software issues, and device repairs What is IoT Device Lifecycle Management? IoT (Internet of Things) DLM focuses on managing the various stages of an IoT device's life. Such devices are connected to the internet and are used to collect and transmit data, often for automation and control purposes. It usually increases the complexity as data privacy and security risks increase because of the volume and sensitivity of the data IoT devices transmit. How can device lifecycle management be improved? By implementing automation on various aspects such as device procurement, software updates, and maintenance and repair scheduling.  Enhance inventory tracking and ensure everything is tracked accurately  Implement proper device security by using strong passwords, two-factor authentication, and regular security updates.  Regularly upgrade or replace devices: As devices age, they may become slower or less reliable. By regularly upgrading or replacing devices, organizations can ensure that their end-users have the latest technology and features at their disposal.  Properly dispose of end-of-life devices when they reach the end of their useful life, they must be disposed of in a responsible manner. This can involve wiping devices to remove sensitive data, and disposing of devices in accordance with relevant laws and regulations. What things to consider when choosing an MDM or DLM Solution? When choosing a solution for your company’s devices, there are several factors that you should consider to ensure that you select the best solution for your organization's needs: Compatibility: Consider the types of devices that you will be managing and ensure that the solution is compatible with these devices. Features: Consider the features such as device enrolment, inventory management, security policy management, and DLM/MDM software. Integration: Consider how easy is to configure the solution with your organization's existing systems and processes. It’s best to choose a solution that is compatible with your existing systems and can be easily integrated into your workflow. Watch out for hidden costs, lack of transparency, upfront costs, subscription fees, and maintenance or support costs. Choose a solution that fits within your budget. Scalability shouldn’t be neglected if your organization is growing, the solution should accommodate the remote work culture, future growth, and the changes in your device fleet. At Unduit, we offer turnkey solutions for your enterprise device management. We help Fortune 500 companies minimize the TCO on end user devices. Get in touch with us to learn more. 

Suhaib K.

ITAD specialist

Let’s talk more

Get in touch with us, we’d love to hear from you!

By accepting all cookies or continuing to use this website, you consent to our cookies. Please review our Privacy Notice for more information about how we use them.

By accepting all cookies or continuing to use this website, you consent to our cookies. Please review our Privacy Notice for more information about how we use them.