EOL IT Services has now merged with tier1 Asset Management Ltd

The Delete Key Is Not A Secure Way To Dispose of Business Data

by | Oct 20, 2015 | IT Security

For the majority of us, the delete key is simply a useful tool that means the data that we no longer need is out of our way. That said, most of us rarely take a moment to think about where those files go after we have hit the button. After all, if the data is not sensitive or is for personal use it is usually not a huge concern. However, when it comes to the disposal of sensitive business data you will need to find a better and more secure, way of deletion – the delete key is not sufficiently secure. So what actually happens to data when it is disposed of using the delete key?

A common misconception is that the ‘Delete’ key erases the data, and that moving it into the recycle bin writes over the data in the file. However, this is just that: a misconception. All that this achieves is to simply move the file from one place on your computer to another. Deleting the file means that the space that it once occupied on the disk is free, but it will not necessarily be overwritten for a very long time until the disk has been reused many times. This will vary from disk to disk but, until it has eventually been overwritten, the information can be recovered.

Here’s an explanation of what a file actually is, and what happens when it is deleted:

The file consists of two parts:

1. An entry that makes a record of the name of the file and a list of the ‘blocks’ on the disk that contains the data within the said file. The operating system records the fact that these parts of the disk are currently in use.

2.The ‘blocks’ that actually contain the data content on the file.

When the file is deleted:

The ‘blocks’ that were recorded as containing data are now marked as ‘free,’ and will be made available for other files stored on the disk to use. The old record of the file on the disk is made available for new files to take its place, and the old file effectively ‘disappears’ from the folder.

But, be aware – the ‘blocks’ that contained the data content are not affected at all, meaning that the data within them remains until newer files eventually overwrite them – they can be recovered until they are actually overwritten.

How to delete your files forever

It is possible to prevent the recovery of these ‘deleted’ files and to securely overwrite the data that they contain. This is usually a simple and fast task for anyone with a little computer knowledge.

However, preventing the recovery does require specific tools. It is not a suitable default task, because for this to happen by default it would be very slow and cause wear on the disk. This would also mean that, if any important data were to be deleted by mistake, it would be difficult to recover effectively and quickly.

Implementing a Secure Data Destruction Process

From a business data perspective, all staff should be made aware of what happens when they delete a file. Ideally, you should also have a process in place for the secure destruction of sensitive data that is no longer required.

[Photo Credit:  Digital Adrian ]

Recent Stories

What Do Refurbished Technology Grades Mean?

What Do Refurbished Technology Grades Mean?

As enterprises strive to balance their sustainability targets and a limited financial budget with the technology requirements of the business, an increasing number of CIOs are taking a circular approach to IT procurement. Our ‘take, make, dispose’ culture has had a...

7 Questions to Ask Your ITAD Supplier.

7 Questions to Ask Your ITAD Supplier.

The growth of the cloud, the emergence of hybrid working and remote collaboration along with the soaring quantities of data-rich Internet of Things devices means that IT asset disposition no longer solely concerns the disposal of end of life IT assets. Today’s ITAD...

Are Unintentional Cyber-attackers Risking your Data Security?

Are Unintentional Cyber-attackers Risking your Data Security?

As we learnt during the last couple of years, for the cyber-criminals, a crisis merely presents an opportunity. In 2020, malware attacks rose by 358% and in the first quarter of 2022, Russia experienced nearly 3.6 million data breaches, an 11% increase*. Cyber-attacks...