Around here, we pride ourselves on effective data sanitization. We are a member of NAID, and we built our own accredited data erasure software to make it happen. Sanitization is the bedrock of a strong ITAD strategy and the primary risk-mitigator on hardware that has aged out of regular use. Should you trust Certificates of Destruction to prove that a contract company has safely sanitized your data?
Upgrading equipment, decommissioning apps, or migrating to a new data center can be a risky time in any IT lifecycle, and when you’re decommissioning hardware and moving on you need to be prepared. We’ve done a few of these in our time, so we’ve pulled together a couple questions to help you navigate the choppy waters.
Zynga was at it again. Times had changed, and they needed to change with them. Back in 2009 in an effort to curb excess technology spending, Zynga made the decision to migrate partially out of Amazon Web Services (AWS) and onto a hybrid cloud powered by CloudStack. However, when you grow like Zynga has things tend to change quickly, and after a few years of using their internal Z-Cloud it was time for another change.
According to a 2015 study by IBM and the Ponemon Institute, the average data breach now costs a total of $6.5 Million or about $217 per lost or stolen record. That’s a new record high, and the trend is definitively on the way up. So what can you do to prevent or (God forbid) recover from a data breach?
Answer: Almost always. At least not right away.
“We’ve emptied your trash bin,” said the Computer. Whether you use Windows, OS X, or Linux, many people are too trusting of their computing environments and take the computer at it’s word. Don’t make this mistake. Just because you delete a file, doesn’t mean that the data is actually gone.