Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 
 

How to Dispose of Confidential Data

Companies spend lots of money on protecting their networks and yet, one aspect of data security is surprisingly overlooked – the disposal of old hardware, especially hard disks. Learn how to effectively tackle this issue in this video.

http://www.youtube.com/watch?v=Yop3xDWx8ag

Comments
Alexandra Co April 24, 201210:29 am

Thank you for sharing this. It was definitely an enlightenment on my part as a home user because I really thought that once I delete something from my computer’s memory, it will be totally eliminated. I just realized how clueless I was after coming across to this video. From now on, I will be responsible enough in putting away hard disks.

I will also give those recommended software a try to make sure that I have deleted all data in my hard disks. Good thing I browsed through this site for it came in handy and very informative! I will share this one for sure.

Dane M.A. April 29, 20128:21 pm

This looks like a reputable site. And I would assume, you recommend reputable AND safe services, also.

But, I would still like to ask this. Those free hard drive, Wipe and Dban, are safe to use, right?

Better safe than sorry, so I had to ask. Wouldn’t want to assume.

And would any type of magnet do? How big or powerful should the magnet be? Would ref magnest suffice? Or should I get something bigger or industrial-sized ones?

I would appreciate a response. You can email me or you can respond to this comment.

Thanks for the vid. Would definitely be sharing this.

 

Related Videos

 

Choosing the right patch management software

on June 12, 2013

http://www.youtube.com/watch?v=QeDUdg9fWUw A recent Ponemon Institute study estimates it costs businesses $214 per single, compromised record — so just imagine what it would cost if thousands of records on your system were compromised. Add to that the impact on reputation, lost …

0

How event monitoring can prevent IT disasters

on June 25, 2012

Knowing what’s going on in your network is the best way to keep it all running smoothly. Being able to spot problems before they happen will make you a legend in the IT room and in the board room! Using …

1

PCI DSS: Twelve IT requirements

on May 21, 2012

The Payment Card Industry Data Security Standards — or PCI DSS — cover any organization that directly accepts credit or debit card payments. Learn more about PCI DSS’s 12 key requirements in this quick overview; together they make up the …

1

Why you Need to run a Vulnerability Assessment

on April 11, 2012

The old saying, “prevention is better than cure”, is as true today as it ever was – and it definitely applies to information security. But to protect against actual and potential network vulnerabilities, you first need to know what they …

1