Flash disk security is very different to magnetic drives says Origin Storage
"A lot of companies have made the understandable mistake of presuming that flash drives are a slot-in replacement for magnetic drives, when in fact nothing could be farther from the truth," he said.
"And as prices have fallen, a lot of firms have gone for solid state drives (SSDs) to tap into the advantages of rapid boot times, especially or relatively smaller capacity flash drives," he added.
Cordial says that researchers at the University of California have discovered that the electronic data shredding procedures - aka data sanitisation - do not always work the same on SSDs as on magnetic drives .
This, he explained, is due to the complex electronics on some of the latest generation of SSDs, which intercepts a data delete request and often only deletes the header, rather than the full data clusters that go to make up a given file on a magnetic drive.
This means, the Origin Storage MD says, that so-called 'disk doctor' programs, which allow data retrieval on a sector-by-sector basis, without resorting to requiring header data, as an operating system normally does, can effectively undelete supposedly sanitised data files on an SSD.
The bottom line, says Cordial, is that 'conventional' data overwrite commands which have worked well on magnetic drives since the earliest days of PCs in the 1980s, cannot be relied upon to function in the same manner with a flash drive.
"As the university researchers found, the erase procedures provided by manufacturers should be verifiable as well, so that users could easily check post-sanitisation that their data had been removed," he said.
"We could have told the researchers that. This is why we recommend SSDs for specific applications and magnetic drives for other uses. It's also why, where high levels of security are required, we recommend magnetic drives with additional levels of security, such as PIN/password entry system on our Data Locker Pro series ," he added.
For more on the SSD delete research findings: http://bit.ly/h0mgmM
For more on Origin Storage: www.originstorage.com
Press releases you might also be interested in
Weitere Informationen zum Thema "Sicherheit":
Was ist ITIL?
Die IT Infrastructure Library (ITIL) ist eine Sammlung verschiedener praxiserprobter und bewährter Standardverfahren für die IT. Die Sammlung beinhaltet Prozesse, Funktionen und Rollen für IT-Infrastrukturen und -Services. Der Security-Management-Prozess nach ITIL hat die IT-Sicherheit zum Inhalt.Weiterlesen