Data security and IT Asset Disposal Today

Information availability and risks are evolving. Is your ITAD strategy 

With internet traffic set to cross the 1 zettabyte – that’s 1 followed by 21 zeros – threshold next year, we are at the dawn of a new and potentially unsecure information age. The flow of information is at an estimated 30,000 gigabytes a second, a surge from a mere 100 per second in 2002. Cisco says as much as 79% of this traffic will be in some form of video streaming. The rising implementation of video communication between business and government agencies will add a notable part of this traffic. File sharing, especially of sensitive material from corporations, constitutes another 7% of that traffic, according to Statista.

From personal passwords to encrypted commercial data, information sensitivity and needs for its security is growing quickly. With IP theft, corporate espionage, online fraud, hacking and theft of sensitive data on the rise, McAfee estimates the global cost for cybercrime to be around $445 billion a year. Some other studies peg these superfluous losses to be as much as a $1 trillion. Banks, insurers, data centres, hospitals and sectors thriving on intellectual property (such as pharmaceuticals and equipment manufacturers) are all potential cybercrime victims. Additionally, data theft is on the rise. Personal consumer data is vulnerable to hacking, especially sensitive information relating to one’s health, banking and online shopping habits. Simple computerised cash registers at the point-of-sale, terminal hardware tracking online payments and data-bearing drives for virtual cloud storage networks are all examples of vulnerable infrastructure.

Information is at risk of infringement, pilferage and theft at every stage of equipment’s lifecycle. Despite stringent security measures like firewalls and encryption, residual data – even after being erased – may leave some information inadvertently recoverable. As such, new corporate policies to improve data security measures during the disposal of end-of-life IT assets are emerging. These go right from secure collection, monitored transportation, protected storage, purging and thorough data eradication, destruction of data rich components through to recycling the IT asset. Secure data destruction methods are explained in detail by Sims Recycling Solutions, an IT lifecycle management and electronics recycling pioneer.

Regional and global legislation is also developing alongside corporate IT asset disposal policies. In the UK, the Data Protection Act has been in enforcement in since 1998 and mandates rigorous rules around the disposal of information records and data disclosure. The WEEE Directive  has also expanded since its inception in 2002 and now administers policies for the secure disposal of data-bearing electronic equipment.

Accreditations now play a major role in recognising industry standards. in establishing information security management systems within the entire value chain. ISO 27001 is an example.  The Asset Disposal and Information Security Alliance (ADISA) awards a major accreditation that can be seen as an industry benchmark. ADISA measures an ITAD service provider’s capabilities in implementing standards around mitigating the data risks during the entire disposal stage of an IT asset’s lifecycle, and ensuring the most optimum data security measures through each stage of the value chain.

Embedding a secure asset disposal strategy in to IT inventory management is imperative today, where the availability of data – sensitive to the individual or corporate – has evolved and so has the advent of the risks around data theft and misuse. Responsible IT asset management much include a 100% secure and certified data disposal system to ensure a fool-proof disposal supply chain for end-of-life IT assets.

 

Meet with Sims Recycling Solutions at our Enterprise Security & Risk Management 2015 event next week (28th) at the Hotel Russell, London. The event is a gathering of senior IT and business professionals, brought together to discuss the impact of cyber security in the modern day.


Tags:
blogsESRM

BACK TO BLOGS