How To Securely Wipe a Hard Disk Drive

How To Securely Wipe a Hard Disk Drive

How To Securely Wipe a Hard Disk Drive image

How To Securely Wipe a Hard Disk DriveI’m often asked by friends and family who have old computers that they want to dispose of, give away or sell, how to securely wipe a Hard Disk Drive.

Used Hard Disk Drives on eBay are often ripe with leftover data, leaving the former owner of the computer open to identity theft or other nefarious challenges.

Wiping the data on a Hard Disk is therefore key before you sell, give away or even throw out an old computer.

Thankfully, there’s a simple solution.

Active KillDisk – Hard Drive Eraser

How to Securely Destroy DataThe software Active KillDisk is a free and easy to use tool that will help you securely wipe your Hard Disk drives before disposing of them.

The KillDisk Freeware suite will help you create a Bootable USB Disk that you can then pop in the machine you want to wipe. Reboot with the USB Disk inserted, follow the instructions, and voila – your old HDD is wiped to a level that most eBay buyers or donation receivers will never be able to recover data from.

KillDisk also produces more advanced solutions for both Home and Business users, but for most friends and family, KillDisk Freeware should be sufficient.

Why Not Physically Destroy the Hard Disk?

Physically Destroying a Hard Disk Drive
photo credit: purplemattfish via photopin (license)

I’ve heard the assumption that sticking a nail through the Hard Disk will also secure your data. With my green hat on, this isn’t a preferred option.

However, even if you couldn’t care less about the environmental impact of chucking out a dead hard disk, then be aware that I’ve seen experts demonstrate how they can recover data from even the most hammered Hard Disk Drives. For instance, I’ve attended a demonstration where the chaps over at Vogon Computer Forensics, who specialise in Computer Forensics and Data Recovery, will tell you stories about how they’ve recovered data from all sorts of situations where you’d have thought the HDD is unrecoverable.

[tweet_box design=”default”]Taking a hammer to your old hard disk drive is not enough – data can be recovered from even the most damaged hard disk[/tweet_box]

I also have friends who work in IT for UK Police Forces who tell me that when an HDD in one of their PC’s fails, even though it is swapped for a new model under Warranty, they destroy the data on the HDD before returning it to the manufacturer to err on the safe side.

Conclusion

The data stored on your Hard Disk Drives can easily be used to inflict identity theft, or worse, upon you.

Whenever you are selling, giving away or even throwing away an old computer, always make sure to use a tool such as Active KillDisk to securely wipe the data on your Hard Drive — formatting the disk is simply not effective enough.

[tweet_box design=”default”]If you’re selling, donating or throwing away an old computer, always use a tool such as Active KillDisk to securely wipe the data[/tweet_box]

You Might Also Be Interested In

How To Protect The Data On Your Laptop Computer

How To Choose The Correct Hard Disk Drive For Your Server or NAS

How to Ethically Dispose of IT Equipment

RICHARD TUBB

Richard Tubb is one of the best-known experts within the global IT Managed Service Provider (MSP) community. He launched and sold his own MSP business before creating a leading MSP media and consultancy practice. Richard helps IT business owner’s take back control by freeing up their time and building a business that can run without them. He’s the author of the book “The IT Business Owner’s Survival Guide” and writer of the award-winning blog www.tubblog.co.uk

All Posts

You might like:

MSP Pricing Models for Profitability, Growth and Client Satisfaction image

MSP Pricing Models for Profitability, Growth and Client Satisfaction

Article | By Stephen McCormick
Complement Your Cybersecurity Strategy with Security Awareness Training image

Complement Your Cybersecurity Strategy with Security Awareness Training

Article | By Stephen McCormick
How A Penetration Test Uncovered Astonishing Network Flaws image

How A Penetration Test Uncovered Astonishing Network Flaws

Artificial Intelligence | By Richard Tubb
Defence in Depth: Better Results From a Layered Security Strategy image

Defence in Depth: Better Results From a Layered Security Strategy

Article | By Stephen McCormick
Phishing Defence Coaching: A Targeted Approach To End-User Security Training image

Phishing Defence Coaching: A Targeted Approach To End-User Security Training

Article | By Stephen McCormick
Cybersecurity Masterclasses: Practical Advice To Boost Security For MSPs image

Cybersecurity Masterclasses: Practical Advice To Boost Security For MSPs

Article | By Stephen McCormick
How to Measure Profitability to Make MSP Businesses More Robust image

How to Measure Profitability to Make MSP Businesses More Robust

Article | By Stephen McCormick
Spotlight on 2024 Cyber Trends And AI-Powered Email Threats image

Spotlight on 2024 Cyber Trends And AI-Powered Email Threats

Article | By Stephen McCormick
Breakthrough Ways Of Selling Cybersecurity Solutions To SMBs image

Breakthrough Ways Of Selling Cybersecurity Solutions To SMBs

Article | By Stephen McCormick
The Two Top Most Powerful Trends for MSPs in 2024 image

The Two Top Most Powerful Trends for MSPs in 2024

Article | By Richard Tubb
Webinar: Chilling Cybersecurity Horror Stories from the Professionals at Huntress image

Webinar: Chilling Cybersecurity Horror Stories from the Professionals at Huntress

Article | By Stephen McCormick
Using the Right M365 Tools for Better Productivity & Wellbeing image

Using the Right M365 Tools for Better Productivity & Wellbeing

Article | By Stephen McCormick

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Explore.

Share via
Send this to a friend