wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Data Security must be your Priority!

profile
Uzma Behlim
Dec 14, 2022
1 Like
0 Discussions
148 Reads

As new smartphones hit the market, people are looking to offload their outdated devices more frequently than ever before. When selling an old phone, the standard procedure is to restore the device to factory settings, wiping it clean of any personal data. This creates a new-phone feel for the new owner and offers protection for the original owner. However, a security firm has determined returning devices to factory settings doesn't actually wipe them clean. 

Your PC is old, and now you want to sell it and get a new one for yourself. But your computer is cluttered with bank account information scanned copies of your driver's license, birth certificate, and other personal information. You know the data is still on your hard disc, even though you 'shift erased' the files; it's only hidden from the operating system.

What Happens When You Delete a File

Windows (and other operating systems) keep track of where files are on a hard drive through “pointers.” Each file and folder on your hard disk has a pointer that tells Windows where the file’s data begins and ends.

When you delete a file, Windows removes the pointer and marks the sectors containing the file’s data as available. From the file system’s point of view, the file is no longer present on your hard drive and the sectors containing its data are considered free space.

However, until Windows actually writes new data over the sectors containing the contents of the file, the file is still recoverable. A file recovery program can scan a hard drive for these deleted files and restore them. If the file has been partially overwritten, the file recovery program can only recover part of the data.

When Windows deletes a file, it moves it to a specific hard drive sector and hides it from the operating system. Even after emptying the Recycle Bin, there is still a chance of data recovery if no new data is written on those specific sectors where the deleted files exist.

Why Deleted Files Aren’t Erased Immediately

If you’re wondering why your computer doesn’t just erase files when you delete them, it’s actually pretty simple. Deleting a file’s pointer and marking its space as available is an extremely fast operation. In contrast, actually erasing a file by overwriting its data takes significantly longer. For example, if you’re deleting a 10 GB file, that would be near-instantaneous. To actually erase the file’s contents, it may take several minutes – just as long as if you were writing 10 gigabytes of data to your hard drive.

To increase performance and save time, Windows and other operating systems don’t erase a file’s contents when it’s deleted. If you want to erase a file’s contents when it’s deleted, you can use a “file-shredding” tool

Preventing Deleted Files from Being Recovered

If you have confidential, private data on your computer, such as financial documents and other sensitive pieces of information, you may be worried that someone could recover your deleted files. If you’re selling or otherwise disposing of a computer or hard drive, you should exercise caution.

You can use a utility that automatically wipes your hard drive’s free space – by writing other data over the free space on your hard drive, all deleted files will be erased.

Erase Data With a File Shredder

Don’t Overlook your SD cards

Overwrite the data atleast 3 times

Don’t forget to Log out from all your accounts

Back up the device before any procedure.

Download a remote wiping app.

Clear the internal memory.

Remove your old device from your list of trusted devices.

Unpair your smart devices

Being lazy and ignoring these steps won’t be ant beneficial for you, instead may risk your data!

So, next time, whenever you decide to replace or sell your device, remember to wipe your data off!

 


Comments ()


Sign in

Read Next

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

Deadlock and Starvation

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Fashion marketing in india

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Operating system and overviews

Blog banner

Game Theory in Blockchain

Blog banner

Threads

Blog banner

Animal’s have my heart

Blog banner

Short note on expert system

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

PHISHING

Blog banner

Uniprocessor scheduling

Blog banner

INTRODUCTION TO C#

Blog banner

Importance of business process documentation

Blog banner

Rain bow

Blog banner

Processing Crime and Incident Scenes

Blog banner

Data Lake

Blog banner

SPAM

Blog banner

VIRTUAL MACHINES

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

The seven-step improvement process

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Interrupts

Blog banner

Concurrency and Deadlocks

Blog banner

SQL Injection Techniques

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Getting into Anime

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Access management

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner

Corporate Discipline.

Blog banner

Asana

Blog banner

Types Of scheduling

Blog banner

The Right way of cooking

Blog banner

Security and E-mail

Blog banner

USPS mail

Blog banner

Data Warehouse Bus Matrix

Blog banner

Security issues

Blog banner