sss78 - Fotolia
I read that recycled PC components -- keyboards, trackpads, monitors -- can retain data even after the PC is turned off. Is there any truth to this and, if so, is it something my enterprise should be concerned about? How can we keep data safe?
It's been long known that desktops must be securely erased prior to them leaving your enterprise, and this basic idea extends to other types of devices with hard drives or some type of storage that can hold hidden data. For example, multifunction printers or other similar printing devices have hard drives that can retain print jobs. Even RAM can retain data long enough after it is turned off and back on that cold boot attacks could be successful. In addition, many keyboards have on-board memory that saves specific keyboard configurations and commands.
Data is stored in many different buffers throughout the system -- wherever there is an input or output -- so that integrity checking can be done to make sure that sent data was received. Even paper retains data when erased in the form of the indentions in the paper.
Enterprises with the highest security requirements are likely already aware that data can hide on or escape from almost any part of a computer. For these reasons, enterprises must securely destroy all parts of the computers that can't be securely erased when removing the devices from service, including printers, keyboards and other components that can potentially store data.
While the majority of enterprises today do not have these high security requirements, organizations should take standard precautions when disposing old equipment -- this could include degaussing or securely erasing the storage on the components before recycling them. However, the added cost of just destroying the hardware components may be the easiest and most secure way of disposing of old equipment.
Ask the Expert!
SearchSecurity expert Nick Lewis is ready to answer your enterprise threat questions -- submit them now! (All questions are anonymous.)
Take a quiz on smart recycling of electronic equipment.
Learn how to quickly and securely erase a hard drive.
Dig Deeper on Network device security: Appliances, firewalls and switches
Related Q&A from Nick Lewis
Cloud penetration testing presents new challenges for information security teams. Here's how a playbook from the Cloud Security Alliance can help ... Continue Reading
Island hopping attacks create enterprise risk by threatening their business affiliates. Here's how to create an incident response plan to mitigate ... Continue Reading
Many cloud providers are tight-lipped about internal security control details. Learn how to evaluate cloud security providers with certifications and... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.