Identity theft and breaches of personal data records are a constant in news reports, with more serious breaches being discovered daily. Protecting sensitive data is critical for any organization that collects this information from customers and partners, data sanitization is one step that is often neglected.
Table of Contents
ToggleNearly 12 million records have been exposed since the beginning of 2017, according to Identity Theft Resource Center (ITRC). Althoughย data sanitizationย is an important step in preventing sensitive data from being accessed or breached, it’s still relatively unknown and often misunderstood within the technology and IT security industry. Today, a new independent network, known as the International Data Sanitization Consortium (IDSC), has launched to champion and promote data sanitization best practices.
Founded inย July 2017, the organization’s mission is to eliminate ambiguity around data sanitization, including terminology, standards and guidelines. This is an area that requires serious attention, as aย recent surveyย of IT professionals worldwide found. When asked to identify the correct definition of data sanitization, 64 percent failed to choose the correct answer. On top of this,ย media reportsย andย data recovery studiesย have repeatedly proven just how easy, common and dangerous it is for data to be recovered โ all because devices had not been sanitized before they were discarded, recycled, traded in, resold or reused.
Data sanitization is defined as the process of deliberately, permanently and irreversibly removing or destroying the data stored on a memory device to make it unrecoverable. This includes traditional IT equipment with data storage and mobile devices, along with internet-connected devices, such as wearables, medical devices and infotainment systems in automobiles. A device that has been sanitized has no usable residual data, and even with the assistance of advanced forensic tools, the data can never be recovered. There are three methods to achieve data sanitization: physical destruction, cryptographic erasure and data erasure.
IDSC’s members include influential technology and IT security experts across academic institutions, analyst firms, software providers, hardware manufacturers, IT Asset Disposition vendors and enterprise businesses.ย Richard Stiennon, Chief Strategy Officer of Blancco Technology Group and former Gartner analyst, is a founding member and acting Director of the IDSC.
“I am astounded by how little is known and understood about data sanitization,” saidย Richard Stiennon, Chief Strategy Officer, Blancco Technology Group and acting Director of the IDSC. “This stems from confusion about the definition of data sanitization and the varying methods for achieving it. For example, many businesses mistakenly implement certain data removal methods, such as a factory reset, reformatting, data wiping and data clearing, because they believe these methods are capable of achieving data sanitization, when in fact they are not. As a result, the vast majority of organizations today aren’t undertaking the necessary steps to implement a data sanitization process and are leaving themselves vulnerable to a potential data breach. This is both disappointing and alarming โ and something we at the IDSC hope to change through ongoing education and guidance.”
IDSC’s Participating Members include:ย | |
Information Governance Initiative | Barclay Blair |
Information Security & Forensics Expert | Paul Henry |
Blancco Technology Group | Richard Stiennon |
Ingram Micro ITAD | Rohini Khanduri |
Kroll Ontrack LLC | Henrik Andersen |
Morgan Privacy Consulting | David Morgan |
Financial Industry Veteran | Craig L. Koon |
Consulting/Technology Industry Veteran | Steve Martin |
“Failing to govern data is an endemic problem that can inflict serious damage on an organization โ and it can happen at any time from the instant a piece of digital data is created right to the very end of its lifecycle,” saidย Barclay T. Blair, founder and executive director of the Information Governance Initiative. “Time and time again across the hundreds of organizations we speak to each year, we see the consequences of this governance failure in litigation, security breaches, loss of customer trust, regulatory sanctions and other completely unnecessary incidents. Data sanitization is an essential part of a holistic and mature approach to governing information, and it is our hope that this initiative will play a major role in driving clarity and adoption on this critical part of the information governance lifecycle.”
The consortium hopes to educate technology and IT security professionals about data sanitization by creating and sharing useful content that will help businesses better manage and protect their data through data sanitization. This educational content will be contributed by each of the IDSC’s participating members and available on a dedicated website:ย www.datasanitization.org.
Paul Henryย is one of the world’s foremost global information security and computer forensic experts with more than 30 years of experience covering all 10 domains of network security.ย Paul Henry explains, “Whether you’re an individual, a business or a government/state agency, failing to sanitize a device properly can have serious consequences. Data sanitization needs to become a bigger and more urgent priority within the IT security industry. I’m extremely proud to be part of the International Data Sanitization Consortium to help make that happen.”
You can read more posts on cybersecurity here
Summary:
Data Sanitization
Data sanitization is defined as the process of deliberately, permanently and irreversibly removing or destroying the data stored on a memory device to make it unrecoverable. This includes traditional IT equipment with data storage and mobile devices, along with internet-connected devices, such as wearables, medical devices and infotainment systems in automobiles. A device that has been sanitized has no usable residual data, and even with the assistance of advanced forensic tools, the data can never be recovered. There are three methods to achieve data sanitization: physical destruction, cryptographic erasure and data erasure.