AG Technology

Vector-AG Technology Limited

Why is the overwriting method not recommended for SSDs?

Overwriting data on an SSD (Solid State Drive) is generally **not considered secure** for erasing data, unlike traditional HDDs (Hard Disk Drives). This is due to the fundamental differences in how SSDs manage data storage. Here are the key reasons why overwriting is not secure for SSDs:

1. **Wear Leveling**

   – SSDs use a technique called **wear leveling** to distribute write operations evenly across all memory cells. This prevents any single cell from wearing out prematurely.

   – When you attempt to overwrite a file, the SSD’s controller may redirect the new data to a different physical location, leaving the original data intact in the original cells.

   – As a result, the old data may still exist in the drive, even after overwriting.

 2. **Over-Provisioning**

   – SSDs have extra storage space called **over-provisioning**, which is used for maintenance tasks like wear leveling and garbage collection.

   – This space is not directly accessible to the user, and data stored in these areas cannot be overwritten by standard overwrite commands.

   – Old data may remain in these hidden areas, making overwriting ineffective for secure erasure.

3. **Garbage Collection**

   – SSDs use **garbage collection** to free up space by erasing unused blocks of data.

   – When you delete or overwrite a file, the SSD marks the data as “invalid” but does not immediately erase it. The actual erasure happens later during garbage collection.

   – Until the garbage collection process runs, the original data may still be recoverable.

4. **Lack of Direct Access to Memory Cells**

   – Unlike HDDs, where the operating system can directly overwrite specific sectors, SSDs abstract the physical memory cells through a controller.

   – This means that even if you overwrite a file, the SSD controller may not actually overwrite the physical location where the original data is stored.

5. **Reduced Drive Lifespan**

   – SSDs have a limited number of write cycles (endurance). Overwriting data unnecessarily consumes these cycles, reducing the lifespan of the drive.

   – For this reason, SSDs are designed to minimize unnecessary write operations, which further complicates secure erasure through overwriting.

NIST guidelines for SSD data erasure

The **NIST (National Institute of Standards and Technology)** provides guidelines for securely erasing data from storage devices, including SSDs (Solid State Drives). The most relevant standard for this purpose is **NIST Special Publication 800-88 Revision 1**, titled *”Guidelines for Media Sanitization.”*

 

### Key Recommendations for SSD Erasure:

  1. **Understand the SSD Technology**:

   – SSDs behave differently from traditional HDDs due to wear leveling, over-provisioning, and the use of flash memory. These factors make secure erasure more complex.

 

  1. **Sanitization Methods for SSDs**:

   NIST 800-88 Rev 1 outlines three main sanitization methods:

   – **Clear**: Use logical techniques to overwrite data (e.g., issuing a “Secure Erase” command). This is often sufficient for SSDs.

   – **Purge**: Use cryptographic erasure (if supported by the SSD) or physical destruction if cryptographic erasure is not feasible.

   – **Destroy**: Physically destroy the SSD to ensure data cannot be recovered.

 

  1. **Recommended Steps for SSD Erasure**:

   – **Step 1: Use the SSD’s Built-in Secure Erase Command**:

     – Most modern SSDs support a **Secure Erase** command (ATA or NVMe standard) that resets all cells to a blank state. This is the most effective and efficient method.

   – **Step 2: Cryptographic Erasure (if supported)**:

     – If the SSD supports encryption, you can simply delete the encryption key, rendering the data unrecoverable.

   – **Step 3: Physical Destruction (if necessary)**:

     – If the SSD does not support Secure Erase or cryptographic erasure, physical destruction (e.g., shredding, disintegrating) is recommended.

 

  1. **Verification**:

   – After performing the sanitization, verify that the data has been effectively erased using appropriate tools or methods.

 

### Important Notes:

– **Overwriting SSDs is not recommended**: Unlike HDDs, overwriting SSDs can be ineffective due to wear leveling and may reduce the lifespan of the drive.

– **Check Manufacturer Documentation**: Always refer to the SSD manufacturer’s guidelines for specific sanitization instructions, as methods may vary by model.

 

For more details, you can refer to the full document: 

[NIST SP 800-88 Rev 1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf)

Can deleted data be recovered from an SSD?

Yes, it is possible to recover deleted data from an SSD (Solid State Drive). However, the process of data recovery from an SSD is more complex than from a traditional hard disk drive (HDD).

 

When data is deleted from an SSD, the data is not immediately erased from the drive. Instead, the SSD marks the space occupied by the deleted data as available for new data to be written. This means that the deleted data may still be present on the drive until new data is written over it.

 

However, SSDs use a process called wear leveling, which spreads data evenly across the drive to prevent overuse of certain areas. This means that deleted data may be scattered across multiple memory cells, making it more difficult to recover.

 

Additionally, SSDs employ a process called TRIM, which is designed to optimize performance by erasing data blocks that are no longer in use. This means that if TRIM is enabled on the SSD, deleted data may be erased more quickly and may be more difficult to recover.

 

Despite these challenges, it is still possible to recover deleted data from an SSD using specialized forensic tools and techniques. These tools can analyze the SSD at a low level to search for and reconstruct deleted data. However, the success of data recovery from an SSD depends on various factors, such as the amount of time that has passed since the data was deleted, the extent of wear leveling and TRIM, and the specific methods used by the forensic tool.

What is ITAD?

degaussing report

IT Asset Disposition (ITAD) is the process of disposing of obsolete or unwanted IT equipment in an ethical and environmentally friendly manner. With the rapid pace of technology innovation, IT equipment can quickly become outdated, leaving companies with a significant amount of e-waste. ITAD is an essential process in ensuring that these electronics do not end up in landfills and that sensitive data is securely destroyed.

The Importance of ITAD

ITAD is an essential process that benefits both the environment and companies. The proper disposal of electronic waste helps to prevent environmental pollution and the release of hazardous chemicals into the environment. E-waste is a significant contributor to environmental pollution, and it is estimated that up to 50 million tons of e-waste is produced globally each year. Without proper disposal, this waste can end up in landfills, where it can take hundreds of years to decompose and release harmful chemicals into the soil and water.

In addition to the environmental benefits, ITAD also helps companies to protect their sensitive data. When IT equipment is disposed of, any data stored on the device must be permanently deleted to prevent it from falling into the wrong hands. ITAD providers use specialized software or hardware to erase data securely, ensuring that any sensitive information is permanently destroyed.

 

The ITAD Process

The ITAD process involves several steps, including assessment, data destruction, and disposal. The first step is to assess the IT equipment to determine its value and condition. This assessment helps to determine the best course of action for the equipment, whether it should be resold, recycled, or disposed of.

The next step is data destruction. All data on the equipment must be permanently erased to ensure that sensitive information is not accessible. This process is critical for companies that handle confidential information, such as financial or healthcare data.

Once the data has been securely erased, the equipment can be disposed of, recycled, or resold. ITAD providers will ensure that the equipment is disposed of in an ethical and environmentally friendly manner, following local regulations and guidelines.

Choosing an ITAD Provider

Choosing a reputable ITAD provider is essential to ensure that the IT equipment is disposed of correctly. When choosing an ITAD provider, it is essential to consider several factors, including the provider’s experience, certifications, and compliance with local regulations.

Experienced providers will have the knowledge and expertise to assess the equipment and determine the best course of action for disposing of it. Certifications ensure that the provider follows ethical and environmentally friendly practices.

Compliance with local regulations is also crucial. ITAD providers must follow local regulations and guidelines for the disposal of e-waste. Failure to comply with these regulations can result in fines and legal repercussions for both the provider and the company.

Conclusion

ITAD is an essential process for companies that want to dispose of their IT equipment correctly. The process helps to protect the environment and prevent the release of hazardous chemicals into the soil and water. It also ensures that sensitive data is permanently erased, protecting companies from data breaches and cyber threats. Choosing a reputable ITAD provider is crucial to ensure that the IT equipment is disposed of correctly and ethically.

 

What is hard disk degausser

A hard disk degausser is a specialized device designed to erase data from magnetic storage media, such as hard disk drives (HDDs) and magnetic tapes. By generating a powerful magnetic field, degaussers render the data on these storage devices unreadable, ensuring the complete and secure deletion of sensitive information. In this article, we will delve into the function, benefits, and applications of hard disk degaussers.

Function of a Hard Disk Degausser
Magnetic storage media, such as HDDs, store data in the form of magnetic patterns on their surfaces. A hard disk degausser works by emitting a powerful magnetic field that disrupts these patterns, effectively erasing the stored data. The process is non-discriminatory, meaning it erases all data on the device, regardless of its significance or protection measures

Benefits of Using a Hard Disk Degausser
1. Data Security: Degaussing ensures that sensitive data is irretrievable, providing a high level of data security. This is particularly important for organizations dealing with confidential information, such as financial institutions, healthcare providers, and government agencies.
2. Compliance: Many industries have strict regulations in place for data disposal. Using a hard disk degausser helps organizations comply with these regulations and avoid potential fines or legal consequences.

Applications of Hard Disk Degaussers
1. Data Centers: Data centers often need to dispose of large volumes of outdated or faulty storage devices. Degaussing is an efficient and secure way to erase data from these devices before disposal or recycling.
2. Government and Military: Government agencies and military organizations handle sensitive information that requires secure deletion methods. Hard disk degaussers provide a reliable solution for erasing classified data from magnetic storage media.
3. Healthcare Industry: The healthcare industry deals with confidential patient data, which must be securely erased to maintain privacy. Degaussing ensures that patient information is permanently deleted from storage devices.
4. Financial Institutions: Banks and other financial institutions handle sensitive customer data that must be protected. Degaussing provides an effective means of securely erasing data from storage devices before they are disposed of or repurposed

Conclusion Hard disk degaussers play a crucial role in data security and regulatory compliance across various industries. By generating a powerful magnetic field, these devices ensure the permanent and secure deletion of sensitive information from magnetic storage media, making them an indispensable tool in the modern world of data protection.

What is data erasure?

數據銷毀 (Data Erasure) 主要針對儲存資料嘅電子設備, 包括電腦入面嘅 hard disk, memory card, 電話等等可以儲存資料嘅設備, 當你需要處理呢啲設備, 例如壞咗或者唔再用要棄置嘅時候, 就有需要先將入邊嘅資料徹底銷毀. 如果係電腦做普通format hard disk 係唔可以將資料徹底刪除, 通過數據恢復軟件有機會將資料還原, 如果hard disk壞咗, 亦都冇辦法做到format.

所以我哋會用比較徹底嘅方法, 一般我哋會用消磁機去將hard disk嘅資料徹底銷毀, 原理係利用使使使信息. 好處係一般只需要一分鐘內完成, 但係完成後hard disk唔可以再用返 除咗消磁, 另外可以用抹除嘅方法, 原理係喺hard disk每一個位置上面寫上覆寫資料, 將成個hard disk之前的資料覆蓋, 好處係做完之後過hard disk可以重用, 但就比較花時間, 一般會適合想重用返個hard disk嘅用家. 另外亦都可以透過物理破壞, 即係整爛個hard disk去銷毀data, 但一般都建議做咗消磁處理先, 因為理論上data仲係碟面上面, 如果冇消磁都有可能讀到好少部分嘅資料出嚟, 雖然機會唔大.

如果係電話, 通常透過回復原廠設定就可以將資料銷毀, 因為好多電話本身有進行加密, 回復原廠設定後, 加密嘅資料會被刪除, 所以一般都可以將資料徹底銷毀, 如果唔放心或者部機開唔著就要進行物理破壞, 要拆開部機將入面粒memory chip 整爛.

所有裝置都有唔同嘅方法去徹底銷毀數據, 有需要可以同我諮詢.

What is data recovery

數據恢復 (Data Recovery)簡單嚟講, 就係將你壞咗嘅裝置入面的資料恢復, 或者將你唔見咗或者刪除咗嘅資料恢復. 譬如你部電腦壞咗, 外置hard disk 或者 USB 手指壞咗, 將入邊啲資料恢復出嚟. 處理方法有好多種, 主要睇返情況而定, 有時電腦壞咗, 資料未必有問題, 因為資料係儲存喺hard disk 或者 SSD入面, 如果好彩hard disk 或者 SSD冇壞, 咁直接喺第二部機讀返出嚟就得. 如果hard disk有問題, 咁就要睇返屬於乜情況, 通常磁頭問題比較常見, hard disk入面會有磁頭讀寫資料, 如果磁頭出咗問題, 好多時過hard disk會有怪聲, 呢啲情況就要即刻斷電, 因為如果繼續通電, 有可能令到入面隻碟嚴重刮花, 咁就有可能做唔到data出嚟. 處理方法係要換過好嘅磁頭入去, 而換嘅過程係需要喺無塵環境進行, 因為如果有塵喺hard disk入面, 就有可能導致碟面刮花. 另外, 換入去嘅詞頭都需要同原本個磁頭一樣先可以, 有時hard disk 就算 model 一樣, 磁頭都可能唔一樣. 除咗磁頭問題, 有時你可以讀到入面啲資料, 但係好慢, 或者開唔到, 咁就可能係個hard disk有bad sectors, 簡單嚟講即係hard disk有啲位置壞咗, 當電腦嘗試讀呢啲位置, 因為有問題而會好慢或者hang機, 呢啲情況我哋可以用工具將冇問題嘅資料讀出嚟, 而係有問題地方嘅資料有可能會冇左, 似乎情況而定.

如果USB手指壞咗, 首先要睇下係唔係手指入面粒chip爛咗, 如果爛咗就冇辦法處理, 其他常見問題包括插入電腦後問你要唔要格式化, 呢啲情況一般係分區出咗問題, 用專業數據恢復軟件好多時都可以將資料恢復, 但如果插入電腦後冇反應, 就要嘗試用儀器直接讀取memory chip, 睇下可唔可以攞返資料.

如果係唔小心刪除左資料, 刪除完之後冇再save其他新資料落去, 咁都有好大機會恢復到出嚟, 但係如果刪除咗之後, 有放過好多資料入去, 或者繼續用咗好耐, 咁機會就比較細, 因為刪除左資料後, 其實資料仲喺hard disk入面, 電腦係將資料嘅位置信息刪除, 開放返個位置放心資料入去, 所以如果有新資料放咗喺同一個位置, 咁刪除咗嘅資料就會俾覆蓋, 做唔返出嚟.

呢啲係比較想見嘅情況, 如果有其他問題歡迎致電查詢.

Destroy Drives Using A Hard Drive Crusher

The advantages of using a Hard Drive Crusher

Computers are an integral part of modern life and we all know the wide range of ways in which we use them. The problem comes when the computer reaches the end of it’s useful life and it is time to dispose of it or send it for professional recycling.  Packed on your Hard Drive inside your computer or laptop is an abundance of data, much, if not all of which is information you would not like others to have access to.  It is essential therefore that you have procedures for the secure destruction of data prior to computer disposal.

There are a number of ways to destroy a hard drive including erasing, shredding and wiping, but for the purposes of this article we shall consider the use of a Hard Drive Crusher.

What is a Hard Drive and why use a Hard Drive Crusher?

A Hard drive (sometimes abbreviated as HD or HDD) is a non-volatile memory hardware device which permanently stores and retrieves information.There are many variations, but their sizes are generally 3.5″ and 2.5″ for desktop and laptop computers respectively. A hard drive consists of one or more platters to which data is written using a magnetic head, all inside of an air-sealed casing. Hard Drives may be either internal or external but both types can be used to store just about any kind of data be it music, pictures, text, software programmes etc. This data is written to the part of the Hard Drive called the Platter.

It is the Platter that is the target for the Hard Drive Crusher to physically damage beyond repair such that it cannot be put back into a computer and still accessed.  A solution such as the Crunch 250 is a perfect example of a specially designed machine capable of destroying a hard drive in just 9 seconds.  A desktop, office friendly machine such as this is a good solution for processing any number of Hard Drives as it is easy to operate and quick to use.  You can easily crush 250 Hard drives in an hour with a Crunch 250.  It can be installed in any office, and by being used “in-house” it negates the need to send your hard drives off site and entrust your precious data to third parties.  It also provides an ongoing solution so that you don’t have to gather up large numbers of drives and store them while you wait for a mobile crushing service truck to make an appointment.

Is there anything better than a Hard Drive Crusher?

While for some industries simply crushing the hard drive is sufficient evidence that their data is no longer accessible to prying eyes, for some data users an even more robust solution is required.

VS Security Products manufacture a range of degaussers which can be used to remove user data and servo control data from hard drives before they are processed by the Hard Drive Crusher.  Manual degaussers such as the V660 HDD Evo allow you to erase up to 20 hard drives every hour whilst an automatic degausser such as the DataGone can erase up to 200 every hour.

Whether your business requires just crushing, or prefers to degauss and crush, VS Security Products offers an extra tool for ultimate assurance that your responsibilities with regards to data destruction have been fully met and that is its unique Data Destruction Auditor system.  This is a program which can be linked to your Hard Drive Crusher and it will provide you with recorded and printable evidence of all the media you have destroyed.

In Summary:

A Hard Drive Crusher is a very effective, simple and quick method to destroy hard drives without them leaving your premises.  It may be enough for your needs on its own or it can be joined with a degausser and a Data Destruction Auditor system to provide true peace of mind for the security conscious computer user.

Hard Drive Destruction Methods

What is the best way to set about Hard Drive Destruction?

Computers are an integral part of life today. We use them at home, at school and at work.  We store everything that we hold dear on them such as our photos, our contact lists, our course work, our bank details and our company secrets. This information is all stored on the Hard Drive and the question is how do you protect your data when the time comes for you to change from one computer to another?

The Hard Drive can be removed from the computer and destroyed in a number of ways. The key point is to make sure that after you have finished with it the data which is stored on the magnetic Platter inside the drive is not accessible to prying eyes. 

The method of destruction that you choose may be to some extent dependant on who you are and how secret your data actually is. Your holiday snaps are somewhat less interesting to the bad guys than the medical records of A. N. Celebrity for example!

Shred? Wipe? Crush? Degauss?

Hard Drive destruction is achieved by one or more of the following ways:

Shredding –literally “slicing into small pieces”is undertaken in bulk by companies who offer this service.  You can either send them your drives or they may bring a shredder to your premises.  Obviously if you send your drives off site to be shredded you need to be sure of secure transport arrangements once the data is out of your control.  Similarly, if you need to collect up enough drives to warrant a visit from the mobile crusher you need a secure means to store the drives while you collect up enough of them to warrant the cost of a visit.

Wiping is done by the use of downloadable software. While this may be the most cost effect solution to a small user it is worth noting that it is a time consuming process as the software overwrites the drive multiple times, and it does not work on faulty drives. There may even be areas of a drive that your computer has abandoned as bad sectors which will still contain data after you have tried to wipe the drive using this method.  Wiping is therefore not considered to be a high security solution.

Crushing means that the Hard drive is subjected to physical damage usually ending up with either shattering or piercing the Platter and folding up the casing such that it is not possible to connect up the Drive and read the data. This method of Hard Drive Destruction is suitable for a wide variety of people as it offers a very flexible and relatively low cost solution.  Unlike Shredding, a table-top machine such as the Crunch 250 from VS Security Products can be placed in an organisation so that you keep control of all you drives in house, and you can destroy an individual drive in just 9 seconds, or you can collect them up in the safety of your organisation and crush them at the rate of 250 per hour.

Degaussing means subjecting the Hard drive to a high-energy magnetic field which has the effect of scrambling all the minute particles of recorded bits of data into random and completely unreadable configurations. Since, in the first instance it is the data recorded on the Platter which is the thing you are trying to destroy, using a degausser is the absolutely most secure method of Hard Drive destruction. For more information please see our Introduction to Degaussers.

Deciding which method of Hard Drive destruction is best for you depends on several factors including how sensitive your data is, how many hard drives you need to destroy, how much you can spend on a solution.

One additional aid for the most security minded is offered by VS Security Products in the form of its unique Data Destruction Auditor system. This is a program which can be linked to their Hard Drive Crusher – the Crunch 250 – and their degaussers including the DataGauss, the DataGone and the SDD Master. It will provide you with recorded and printable evidence of all the media you have destroyed. 

Why should my business invest in a hard drive degausser?

Using a hard drive degausser in your business can provide total protection for your customer or employee data, but what are some of the advantages of investing in a data degausser? Below we explore some of the advantages that secure data erasure can provide businesses, not just from a practical standpoint, but also, from the point of view of the customer. 

With data security becoming more prevalent and following on from the European Union’s strict GDPR law, businesses are looking for solutions whereby they can protect their customer and internal data while also complying with legislation to ensure safe data disposal. 

Here are some of the advantages of hard drive degaussing and the use of magnetic data erasure in businesses today: 

Data security compliance for GDPR and data law

GDPR is one of the world’s strictest data compliance laws affecting all businesses that trade with or operate in the European Union. Data security has increasingly faced scrutiny after several high profile data breaches in the past several years have made governments step up their efforts to ensure people’s personal data is protected. 

Hard drive degaussing can help businesses erase data from a large number of different mediums to ensure that customer data is properly handled. This is particularly the case when systems are being upgraded and replaced with newer frameworks. The hard drive disposal process is delicate and should data not be erased from all mediums, businesses affected by the new GDPR data protection law can be held liable if data is hacked or accessed by a third party without customer consent. In this situation, disposing of hard drives requires secure data erasure through the use of a degausser so that it cannot be retrieved later. 

Destroying a hard drive’s sensitive data

For many businesses holding sensitive data – being able to erase hard drives securely is a must. This is because a simple hard drive wipe with software doesn’t magnetically remove the data from the actual hard disk itself. Sensitive data, particularly if handled by security companies, the defense industry and other government departments needs to be disposed of with the highest level of erasure, and without third parties being able to recover the data. 

Sensitive data erasure with degaussing is also beneficial for businesses that want to reassure investors and stakeholders that there are internal procedures for data handling and that these are being followed strictly to ensure data safety. 

Hard drive degaussing audits for transparency

Businesses can leverage hard drive degaussing audits to demonstrate their processes for data erasure. This information can be provided to senior stakeholders in the business, managers and other C-level executives to show hard drives being erased and the full reporting of each set of disks that have successfully gone through the process. These reports can also be used elsewhere for legal investigations and for general business data security practices. 

You may like to see the DataGauss XL-LG that comes with an auditing tool. 

Ensuring customer data doesn’t fall into the wrong hands

Being able to erase hard disks securely through degaussing helps businesses erase customer data completely from their systems. This can then be confirmed to customers in writing and supports business transparency as well as ensuring that no third parties can access older data or break into systems to gain sensitive data. 

Supporting internal data processes

Hard drive degaussers can be brought into a company and form part of the data erasure process. Businesses will already have existing processes and may wish to further strengthen their data disposal by adding a layer of security through degaussing. By investing in a hard drive degausser unit, a business can support the internal data erasure processes, create transparent reports and provide total assurance to customers and internal stakeholders that processes are being improved and upgraded for the highest level of data security. 

Improving public image through data protection guarantees

Outside of the practical elements of hard drive degaussing, businesses can also defend their reputation publicly and promote their use of hard drive degaussing as a way to properly handle data. This can strengthen the trust factor for a business with its customer base and also show external stakeholders, governments and organizations that data security is being taken seriously. 

Explore our full range of hard drive degaussers and hard disk destroyers and see how you can secure your business data for the future and improve your reputation through transparency and proper data handling. You can also speak to one of our advisors who can provide you with further insight on the hard drive degaussers we provide and what product will be best suited for your organization or business.