What Happens When Your Deleting Data?

several clocks are arranged on a wall with blue clouds

At some point, you have probably looked through old files and deleted some of that data to organize your computer. You would be surprised to know that the deletion of those files doesn’t really delete them, at least not completely. Continue reading to learn how to delete your documents for good in a secure manner if you replace your computer or upgrade your technology systems. 

How Does Data Get Deleted?

The answer to this question is complicated. In reality, it depends on the hardware one has. There are two types of storage media: hard disk drives (HDDs) and solid state drives (SSDs). HDDs are mechanical devices that utilize a spinning platter that allows a mechanical arm to write and overwrite data. SSDs save data through flash memory to chips that can be read quickly, while also eliminating the need for any moving parts. Additionally, the type of storage media utilized will play a role in how data is eliminated. In regards to the SSD drive, the process is not that simple.

Deleting Data Works in Different Ways

HDDs are easier

Deleting data is simple and straightforward with a hard disk drive. The mechanical arm is placed over the disk to rewrite the data that was originally stored on it. Thus, making the process easy and efficient.

SSDs are somewhat more complicated 

SSDs utilize flash data that cannot easily be overwritten. The original information must be removed before any additional information can be added, making it a lengthy process that can potentially slow down the solid state drive.

SATA-capable SSDs can use TRIM

TRIM is a command that can assist your SSD to know which information can be erased. It is imperative to ensure the durability of the solid state drive is maintained and the processes are run as efficiently as possible. SSDs utilize an internal operation known as “garbage collection” which moves the important data from a block that needs to be deleted. TRIM ensures that the deleted data cannot be copied. Because this is a background process, you can work while the data is in the process of being deleted. In Windows, TRIM is automatically enabled as it replaces Disk Defragmenter.

Is Your Data Really Gone?

Unfortunately, the answer to this question is not that simple. SSDs deceive the operating system in regards to the amount of data blocks available. In other words, a process known as wear leveling is utilized to maintain the longevity of the SSD. Some data blocks may not be trimmed as expected as TRIM also incorporates buffer space that may continue to keep recent data on it as well.

The Answer is Yes… But No at the Same Time

Yes, the documents will be removed. Unfortunately, the security of those deleted files might not be deleted. Therefore, it is important to carefully dispose of old devices, especially if you are planning to donate or resell them. 

Ask Us About the Hardware Refresh Process When Deleting Data

It is understandable that people always want to upgrade to the most recent and reliable technology. Therefore, it is important to be careful when getting rid of older devices. If you have a drive or device that needs to be wiped completely, 4 Corner IT can help you through this process so it may be completed in an efficient, timely, and safe manner without putting your information at risk. To learn more, please contact us at 954.474.2204.

Contact Us Today!

Protecting Employee Privacy is Really Important

employee privacy

Privacy for business means a lot more than protecting the data and personal information of clients. It also extends to just about all data collected by a business, including that of the employees. How can you go about protecting this data without also violating employee privacy? 

Employee Privacy Isn’t Something to Take for Granted 

One particular Pennsylvania state Supreme Court ruling showcases just why it’s important to consider the privacy of employee data. This case was Dittman v. UPMC, a class-action suit that was filed after the University of Pittsburgh Medical Center and UPMC McKeesport had data stolen after hackers accessed the medical center’s systems and stole a considerable chunk of data. This data included personally identifiable information and financial details. Ultimately, the plaintiffsthe employees who had their data stolenwere victorious. According to the case, the hackers had used the data to file illegal tax returns. This cost the IRS a pretty penny. 

 

As a result of this case, the Pennsylvania  Supreme Court established that “an employer has a legal duty to exercise reasonable care to safeguard its employees’ sensitive personal information stored by the employer on an internet-accessible computer system.” On a larger, national scale, employees also have their privacy protected by the Privacy Act of 1974. All that said, we are not legal professionals, so you should not consider this legal advice. However, you are still responsible for protecting the data your employees provide to you. 

Essential Steps to Protecting an Employee’s Privacy 

Thankfully, the right technology can make protecting your employees’ privacy easier. Here are some ways you can accomplish this. 

Private Wi-Fi Connections 

A secure and private Wi-Fi signal can go a long way toward keeping threats away from your network. If you don’t implement a secure wireless connection, you are essentially putting any data sent or accessed over this connection at risk. 

Internet Filtering 

While many solutions will aim to keep threats off of your infrastructure in the first place, this one aims to help your employees keep themselves away from threats found online by blocking access to websites known to house them. You can also filter out websites that are known to waste time throughout the workday. This includes social media or streaming sites. 

Virtual Private Network Use 

VPNs are excellent ways to keep your employees secure when they are away from the protections of your in-house network, a concept which is especially important in today’s age of remote work. 

Device Protections 

Even the most basic protections, like antivirus, firewalls, and spam blocking, can be helpful in preventing the majority of threats. Be sure to have these installed on your devices, and ensure that they are properly activated and maintained at all times. 

Access Controls 

It’s a known fact that the less data someone has access to, the less damage that can be done if their account is compromised. You can also use other factors like two-factor or multi-factor authentication to ensure that only those who are authorized to do so can access specific information. 

You Also Need to Respect Employee Privacy, As Well 

Naturally, there are also limitations as to what you can do with the data you collect from your employees, so it’s your responsibility to know what these limitations are and to ensure that they are followed. Be sure to consider protections, but also to respect the privacy of your employees. 

 

4 Corner IT can help you with this tough balancing act. To learn more, reach out to us at 954.474.2204. 

Contact Us Today

Why It’s Important to Lock Your Computer and Phone

adobeLocked steel padlock in a drilled hole of the black laptop on dark background. Concept of protecting personal data on a computer. A laptop is locked with a lock. Closeup, selective focusstock. locking your phone and computer

Network security is not always about implementing new encryption protocols and using state-of-the-art tools to protect your business. Sometimes, it’s the small things that can make a massive difference. So, if your collective staff can implement this one easy trick, you might be surprised by how beneficial it can be for your network’s security. This practice? Locking your computer and phone.

What Is Locking Your Phone and Computer?

Essentially, your phone and computer can go into a sort of sleep mode when they’re not being used. You do this every time you close the screen on your phone. When your phone “wakes up” to be used, there should be a password required to get back into your phone. Otherwise, anyone can swipe the screen and start reading.

Locking your phone is second nature, and many people have complex passkeys or fingerprints required to do so. Computers are a different matter. Most office workers will stand up and leave their desks without locking their PC. The better practice is to lock your PC. Either perform the lock sequence that will prompt the next user for a password or put it into sleep mode that requires a password upon your return.

Let’s take a quick look at the benefits you get from locking your phone and computer.

Keeping Private Documents Out of Sight

The chances that corporate espionage is going to take place at a medium-sized landscaping company might be small compared to a large media conglomerate. Nevertheless, private documents on phones and computers often hide passwords and personal information.

Allowing those resources to be compromised can harm your reputation. Additionally, can leave you open to many problems, including lawsuits.

Your Work Phone and Computer Are Vectors for Malware

Hundreds of people can come and go from a large workplace daily. It’s not like you can keep track of them all. Unfortunately, it only takes one person with bad intent to find a computer or work phone that is connected to your company’s network and upload malware.

The most common vector for malware these days is email, and many of your company’s resources are geared towards stopping that threat as long as it’s from an external source. However, if someone sends an internal email from a trusted worker’s account and CCs everyone in the building, then it’s safe to say most people would let down their guard enough to open that email.

All it takes is a single terminal to remain unlocked and someone can wreak havoc on your business. Locking your computer and work phones can deter this threat or make at least delay the intruder long enough for them to be caught.

The benefits of locking your phone and computer at work go beyond malware and corporate espionage, though. It stops workers from learning about promotions, pay rates, and internal investigations. Locking your computer can also prevent data from being altered on a project without your knowledge.

Implementing this change is simple, and it does not require a lot of time. Get your team together, teach them how to lock their computers and phones, and test them once in a while to make sure they’re compliant. Not only will this increase security, but it will make your workers feel more like true stakeholders in the well-being of your business.

Check out our blog posts here for weekly content on business, technology, best practices, and more!

5 Technology Challenges Businesses can Expect in 2020

watch out for cyber attacks this holiday season. technology challenges

As new solutions and inventions continue to aid businesses, they come with a ton of technology challenges. Where a connected world allows you to take your business digital, it comes with the risk of cyber-attacks. Where you can get clients from any corner of the world, there is the challenge of data privacy.

But it is not all doom and gloom. Yes, there are challenges, but forewarned is forearmed. Here are some of the problems you can expect to face in 2020 and how you can prepare.

Cyber Security

More and more customers are coming forward about hackers breaking into their ring devices, and wreaking havoc in their homes. Such attacks are a foreboding that most businesses will struggle with cyber-security in 2020.

Some threats include phishing and social-engineering attacks. Of every 99 emails, one is a phishing attack amounting to 4.8-emails in a workweek. Phishing attacks are the gravest as they can trick a business owner or employee into giving up legitimate credentials. As a result, the hacker can access sensitive business information.

Other threats include IoT (internet of things) attacks owing to the increasing number of smart devices. There is also ransomware which increased by 340% from 2018 to 2019.

Using a password manager, and 2-factor authentication can help secure your business, but only professionals can provide foolproof cybersecurity.

Cloud Network Issues

Cloud computing has allowed better data storage, flexibility, and collaboration. It has allowed large enterprises to make better decisions while reducing costs, but you can expect to have issues with it in 2020.

One of the top cloud network issues will be security. There are risks involved in the implementation and management of the cloud, and reports on hacked interfaces, breaches, and account hijacking don’t help the situation.

Also while cloud computing enables businesses to scale without investing in expensive hardware, the quantities and cost become challenging to predict.

Implementation of Privacy Protection

Back in 2018, the EU general data protection regulations came into force. It was about time, but that came with challenges for businesses. Problems that will persist into 2020.

Governance and accountability top the list of concerns. The regulations created a need for business-wide regulations during the full lifecycle. Also, you have to provide more information to your data subjects (customers), and there is always the risk of getting that wrong.

Businesses also have to keep a detailed record of processing activities which is a burden. Mandatory impact assessment questions about when they are required is still a mystery.

Getting the Right Skills

Though freelancing has allowed businesses to hire from a wide-pool of experts, finding the right skills will still be a concern in 2020. And it should be your top concern as nothing can work without the right people.

Should you choose to hire an in-house expert, you can expect to pay a fortune in salaries, and their supply is quite limited. You also have to contend with compliance issues. As such, we recommend you outsource your IT needs.

Deep Fakes

Finally, you have to contend with deep fakes. People are employing unethical methods to make it seem like politicians and celebrities said things they did not say. Deep fakes will now trickle down, and business and thought leaders will find themselves at the mercy of such technology.

People willing to employ deep fakes will sway people’s opinions and can affect your business.

2020 will be a remarkable year for companies looking to use technology. But with great tech comes equally great challenges. The challenges above are a few you can expect.

Hire IT professionals, as they allow you to focus on the essential things in your business while they provide the necessary support.