Data security nowadays is the burning issue not only for companies and government agencies, but rank and file people as well. In the world of high tech, it is quite a challenge to destroy information, especially when you have no idea how to do it. We are all well aware of recent notorious trials, when the only evidence determining the outcome of the process was the data resurrected from a magnetic device. According to various studies over 40% of all discarded magnetic storage devices do still contain personal and classified info that as you can already guess, can be and is used not in the owner’s favour. Besides, constant hardware upgrade makes the problem even more complicated than ever.
Actually data security is a two-sided problem. It is to be made clear, that providing confidentiality implies not only information to be stored properly, but also be destroyed according to certain rules. The first step to protecting yourself is to know exactly which security precautions work and which do not.
Many people believe the misconception that repartitioning a disk will result in complete destruction of its contents. Actually that is not quite so. Repartitioning the drive only alters references to partitions in the Partition Table, leaving all file data intact. In fact, there are a number of programs available to successfully recover previously deleted partitions.
Formatting a drive also does not guarantee data destruction. Formatting procedure implies modification of the Master File Table (MFT) that keeps track of where file contents are stored on the disk and verification of each sector for consistency. Even a low-level format does not actually erase the file contents for good, since they can still be resurrected from their deleted state with minimal effort by using the popular today Magnetic Force Microscopy technology. MFM is an effective tool to magnetic investigations on sub-micron scale. Image obtained by MFM is the space distribution of some parameter characterizing magnetic probe-sample interaction, i.e. interaction force, amplitude of vibrating magnetic probe, etc. The MFM technology is being successfully applied in resurrecting deleted information even after a multiple overwriting, since it provides a unique possibility to differentiate between ones and zeros of various passes, because they are far from being the same when looking through the Magnetic Microscope.
The only way to make sure that all the data has been erased from a magnetic device is to overwrite all on-disk sectors with random patterns. Although this sounds complex, there is an easy way to do this.
The process of deliberately, irreversibly removing or destroying the data stored on a memory device (magnetic disks, flash memory drives, etc.) is generally known as Data Sanitization. A device that has been sanitized has no usable residual data and even advanced forensic tools should not ever be able to recover it, thus providing maximum level of security.
WHAT WE SPECIALISE IN
HARDDISK RECOVERY [HDD]
SOLID STATE DRIVE RECOVERY [SSD]
ENCRYPTION MEDIA RECOVERY
CCTV/DVR DATA RECOVERY
EXPERTS IN RAID/SERVER RECOVERY
RAID 0 RECOVERY
RAID 5 RECOVERY
VM WARE RECOVERY
OTHER SERVICES WE OFFER
REMOVABLE MEDIA RECOVERY
DATA SANITIZING SERVICES
EMERGENCY 24/7 DATA RECOVERY
We always honor our ongoing commitment to quality products and services and our goal is your total satisfaction. Our services, resources, solutions and options we offer are all supported with 24 hour support and troubleshooting.
Cromac Data Recovery ® is a trademark of Cromac Technologies | ALL RIGHTS RESERVED | CROMAC TECHNOLOGIES | © 2020