1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: Ensuring data security with a bucket of worms and a hammer;...

Discussion in 'CSO' started by RSS, Jun 18, 2015.

  1. RSS

    RSS New Member Member

    Someone recently asked me a question about data destruction, which got me thinking: What is it that works for me, and for other security-minded people, to get us in the habit of destroying sensitive data in junk mail and on old drives and devices?

    There are lots of lovely technologies out there that will wipe and shred everything till it’s of no functional use, but it wasn’t until I found something more imaginative that I got into the habit of destroying my data. I was sure I was not alone in this, so I looked into the data destruction habits of other security-minded people to see what worked for them.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page