EOL IT Services has now merged with tier1 Asset Management Ltd

The Delete Key Is Not A Secure Way To Dispose of Business Data

by | Oct 20, 2015 | IT Security

For the majority of us, the delete key is simply a useful tool that means the data that we no longer need is out of our way. That said, most of us rarely take a moment to think about where those files go after we have hit the button. After all, if the data is not sensitive or is for personal use it is usually not a huge concern. However, when it comes to the disposal of sensitive business data you will need to find a better and more secure, way of deletion – the delete key is not sufficiently secure. So what actually happens to data when it is disposed of using the delete key?

A common misconception is that the ‘Delete’ key erases the data, and that moving it into the recycle bin writes over the data in the file. However, this is just that: a misconception. All that this achieves is to simply move the file from one place on your computer to another. Deleting the file means that the space that it once occupied on the disk is free, but it will not necessarily be overwritten for a very long time until the disk has been reused many times. This will vary from disk to disk but, until it has eventually been overwritten, the information can be recovered.

Here’s an explanation of what a file actually is, and what happens when it is deleted:

The file consists of two parts:

1. An entry that makes a record of the name of the file and a list of the ‘blocks’ on the disk that contains the data within the said file. The operating system records the fact that these parts of the disk are currently in use.

2.The ‘blocks’ that actually contain the data content on the file.

When the file is deleted:

The ‘blocks’ that were recorded as containing data are now marked as ‘free,’ and will be made available for other files stored on the disk to use. The old record of the file on the disk is made available for new files to take its place, and the old file effectively ‘disappears’ from the folder.

But, be aware – the ‘blocks’ that contained the data content are not affected at all, meaning that the data within them remains until newer files eventually overwrite them – they can be recovered until they are actually overwritten.

How to delete your files forever

It is possible to prevent the recovery of these ‘deleted’ files and to securely overwrite the data that they contain. This is usually a simple and fast task for anyone with a little computer knowledge.

However, preventing the recovery does require specific tools. It is not a suitable default task, because for this to happen by default it would be very slow and cause wear on the disk. This would also mean that, if any important data were to be deleted by mistake, it would be difficult to recover effectively and quickly.

Implementing a Secure Data Destruction Process

From a business data perspective, all staff should be made aware of what happens when they delete a file. Ideally, you should also have a process in place for the secure destruction of sensitive data that is no longer required.

[Photo Credit:  Digital Adrian ]

Recent Stories

The Hidden Environmental Impact of Our Smartphones.

The Hidden Environmental Impact of Our Smartphones.

Checking emails, social media or the news; banking, making payments, taking photographs, finding our way; it is fair to say that we would be lost without our smartphones, perhaps literally. Oh, let’s not forget, our now indispensable devices also make calls. Essential...

Delivering Social Value Through Our Business Operations

Delivering Social Value Through Our Business Operations

We have become increasingly aware of economic, social and environmental issues. Our renewed sense of community, which naturally came into focus during Government lockdowns, furthered the opportunity for ethical businesses to drive social impact, rather than simply be...

Navigating the Subjectivity of Refurbished IT Devices

Navigating the Subjectivity of Refurbished IT Devices

Reconditioned, renewed, pre-owned… as there are no hard and fast definitions of what the phrase ‘refurbished technology’ means, purchasing restored devices can feel a little like navigating a minefield. This confusion, poor experiences or deep-rooted misconceptions...

Categories