Welcome to YLOAN.COM
yloan.com » Computers & Internet » Concern: The Computer Will Leak Out Important Personal Information
Games Personal-Tech Data Entry registry cruise torrent mac code virus storage uninstaller systems cisco bugs wireless codes maintenance dell update communication trojan atlanta Data Backup Data Storage Data Protection Data Recovery Anti-Virus Windows Linux Software Hardware Mobil-Computing Certification-Tests Computers & Internet Internet

Concern: The Computer Will Leak Out Important Personal Information

HC Network Security Recent Market Research found that a computer sold on eBay contains data on the U.S

. missile system, which is retired and re-disposal of those computers were left over from some of the important safety data. Enterprise Need to develop a proper plan to protect their information security. Reports that the auction on eBay found a computer data on the U.S. missile system. Research report also provides that when the companies out of these computers, the neglect of the safety management of these data and other safety hazards caused by Case .

In this case, due to computer problems is an integral part of a research project to buy, and have been turned over to the FBI, the harmful consequences of zero. But the case also highlights the provision of the relevant agreements to protect the importance of data security, enterprise security should be the method used for all those endangered retired computer.

Forrester Research analyst JohnKindervag that "most companies have problems in the data destruction, because the hardware configuration and inventory control tasks are delegated to a less experienced IT Staff to complete, these employees often do not have relevant training or through the destruction of obsolete computers do not understand the importance of data. They often think that degaussing hardware or data erasure software too expensive or enterprises do not allocate time to do the work and processes. "

Missile system data in the case, the information is from the U.S. Lockheed Martin Company Designed for the U.S. Theater High Altitude Area Defense system in the Air Force plan. As part of its research program is the University of Glamorgan United Kingdom, Australia EdithCowan Longwood University and the University of the United States to buy. Research found that by checking the 300-plus Hard disk There are 1 / 3 of individuals or business establishments included in the relevant data.


Gartner Inc. analyst FrancesO'Brien stressed that this problem will involve the development of a computer disposal process, from budget to eliminate the computer's actual costs should be included. Enterprises need to provide the chain of custody of the relevant agreements, and services from the computer until he is actually disposed of the life cycle when they are need to be considered.

Before the disposal of equipment, data recovery company should be scanned. Should also consider whether the computer will be re-enabled in-house or to sell before the device was completely cleared, it should check whether the computer software will be re-configured and so on.

Computer system is not a simple clear question clean.

O'Brien wrote in the report, "Clear the data from the sense to remove the information from the hard disk, it is not permanently delete data, just let the computer remember the data. The computer clean from the storage media In this way the process of removing sensitive data, it is beyond the scope of ordinary laboratory restoration. "

Forrester Consulting Analyst AndrewJaquith emphasized that, for sensitive data, the best way is to use disk degaussing device, or seven-way free to write algorithms, some of the operating system command line or through the application of tools to provide such support. Some third-party tools to implement the system clean.

He added, "This is the physical choice. On the memory card or hard drive completely clean and is very effective. Often and faster, and the results more satisfactory."

Seagate's senior manager of corporate security GiannaDaGiau that encryption can also provide another level of data protection. Chopped hard physically more expensive. If he can not re-allocated sectors covered by the disk error or prejudice, then the method of covering the disk may not thorough enough.

"Dictation enterprises believe that the only way to protect the disk out is to let them in their own control. That does not mean completely safe, because a lot of the hard disk under the control of the staff can easily create temptations, leading to a These hard drives are lost or stolen. " Forrester's Kindervag


final opinion is that everything should be attributed to the agreement and work flow. When the retired computer into circulation, firms should do?

"If the enterprise has established the right workflow, provides the necessary training and tools to perform these relatively simple tasks, such as eBay then this is the risk of embarrassment would be a great relief" Kindervag said.

Concern: The Computer Will Leak Out Important Personal Information

By: dpdp
Debt Relief Programs – Things To Beware of Before Choosing Debt Relief Complete Guide To Computer Animator Job Duties Debt Relief Programs – Know You Facts Before Getting Debt Relief How To Rip Dvd To Ipod And Convert Dvd To Ipod Touch/nano/classic/shuffle? Alineprint Inc Custom Boxes, Custom Printing Down Filling Down Less Than 120 Grams Can Not Have Both Fashion And Warmth Secrets To Becoming A Successful Computer Animator How to Use the Cricut Ink Cartridges Heart Rate Monitor from Polar - Staying in your Zone and Burning More Calories Fast! Online Computer Training Courses - Marketing Polar Heart Rate Monitor RS100 - The Best Monitor to use to Get Closer to your Workout Goals! Are Online Data Entry Programs Only Run By Fraudsters? Ironman Timex Heart Monitor - Getting the Best for your Workout is Necessary!
print
www.yloan.com guest:  register | login | search IP(216.73.216.180) California / Anaheim Processed in 0.018098 second(s), 7 queries , Gzip enabled , discuz 5.5 through PHP 8.3.9 , debug code: 30 , 4715, 55,
Concern: The Computer Will Leak Out Important Personal Information Anaheim