{"id":44724,"date":"2013-05-14T22:16:02","date_gmt":"2013-05-15T02:16:02","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-08-16T21:05:45","modified_gmt":"2021-08-17T01:05:45","slug":"did-you-wipe-your-tablet","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/did-you-wipe-your-tablet\/","title":{"rendered":"Did You Wipe Your Tablet?"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20130701215556\/http:\/\/storage-news.com\/2009\/10\/20\/japan-to-develop-wireless-solid-state-drive\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-108329\" title=\"Did You Wipe Your Tablet?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hard_drive_wipe.jpg?resize=133%2C100&#038;ssl=1\" alt=\"Did You Wipe Your Tablet?\" width=\"133\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hard_drive_wipe.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hard_drive_wipe.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hard_drive_wipe.jpg?w=600&amp;ssl=1 600w\" sizes=\"auto, (max-width: 133px) 100vw, 133px\" \/><\/a>Techno\u00a0prognostication firm <a title=\"International Data Corporation\" href=\"http:\/\/idc.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">IDC<\/a> says (<em>I think they are right on this one<\/em>) that worldwide sales of tablets will surpass desktop PCs and laptops by the end of 2014. This will result in a boomlet in the <strong>second-hand tablet market<\/strong> and a recent <a title=\"Recycled tablets need to be wiped\" href=\"https:\/\/www.infosecurity-magazine.com\/view\/32152\/recycled-tablets-need-to-be-wiped\/\" target=\"_blank\" rel=\"noopener noreferrer\">article<\/a> on <a title=\"Infosecurity.com\" href=\"http:\/\/www.infosecurity-magazine.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Infosecurity<\/em><\/a> says that in response, firms will need to start <strong>data wipe their old tablets<\/strong> just as thoroughly as old hard disks to protect their data.<\/p>\n<p><a href=\"http:\/\/www.makeuseof.com\/tag\/5-tools-permanently-delete-sensitive-data-hard-drive-windows\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-108331\" title=\"take responsibility for removing data\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/overwritedata-1.png?resize=100%2C100&#038;ssl=1\" alt=\"take responsibility for removing data\" width=\"100\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/overwritedata-1.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/overwritedata-1.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/overwritedata-1.png?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>The company is responsible for any company data held on the mobile device; no matter the flavor of <strong><a title=\"Bring your own device\" href=\"http:\/\/en.wikipedia.org\/wiki\/Bring_your_own_device\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">BYOD<\/a><\/strong> practiced so it is the company that must take responsibility for <strong>removing data<\/strong> from the device before disposal. The <em>Infosecurity<\/em> article says that ensuring that <a title=\"Mobile device\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_device\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">mobile device<\/a> solid-state memory is completely clean is technically difficult.<\/p>\n<h3>Solid-state memory<\/h3>\n<div>\n<p>The article highlights <a href=\"http:\/\/www.blackbeltdefence.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">BlackBelt<\/a>, which has just enhanced its <a title=\"Data erasure\" href=\"http:\/\/en.wikipedia.org\/wiki\/Data_erasure\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">data wiping<\/a> product to include\u00a0<a title=\"Apple Computers\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) and <a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) <a title=\"Android\" href=\"http:\/\/www.android.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a> tablets explained the difficulty to the author. \u201c<em><strong><a title=\"Solid-state drive\" href=\"http:\/\/en.wikipedia.org\/wiki\/Solid-state_drive\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">Solid-state memory<\/a><\/strong> uses a technique called <strong><a title=\"Wear leveling\" href=\"https:\/\/web.archive.org\/web\/20171013112531\/http:\/\/searchsolidstatestorage.techtarget.com:80\/definition\/wear-leveling\" target=\"_blank\" rel=\"noopener noreferrer\">wear leveling<\/a><\/strong> to maximize the life expectancy of the memory chips.\u201d<\/em> BlackBelt\u2019s business development manager Ken Garner told <em>Infosecu<\/em><em>rity,<\/em> \u201c<em>It works by spreading the binary information (0s and 1s) randomly across all the memory cells in the chip. This means that unlike on spinning disk memory, the location of the data on the user interface bears no relation to where it is stored on the drive, making <strong>traditional forms of deletion ineffective<\/strong>.<\/em>\u201d<\/p>\n<p><a href=\"http:\/\/aptito.com\/blog\/2012\/11\/23\/studies-trends-show-tablets-to-become-primary-computer-for-many-by-2016\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-108333 size-medium\" title=\"end users can't data wipe their mobile devices\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_devices2.jpg?resize=150%2C94&#038;ssl=1\" alt=\"end users can't data wipe their mobile devices\" width=\"150\" height=\"94\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_devices2.jpg?resize=150%2C94&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_devices2.jpg?resize=75%2C47&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_devices2.jpg?resize=768%2C480&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/mobile_devices2.jpg?w=800&amp;ssl=1 800w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>BlackBelt <a title=\"Recycled phones retain their previous owners\u2019 data\" href=\"http:\/\/www.infosecurity-magazine.com\/view\/31896\/recycled-phones-retain-their-previous-owners-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">says<\/a> <strong>end-users can&#8217;t data wipe their phones<\/strong>, \u201ci<em>t isn\u2019t possible for an individual to perform a full removal of personal data from any smartphone or tablet using a device\u2019s in-built factory reset or by re-flashing the operating system.<\/em>&#8221; the vendor explains to <em>Help Desk Security<\/em> that wear leveling will, &#8220;<em>over-rule instructions to permanently overwrite old data.<\/em>\u201d<\/p>\n<h3>Solid-state memory wear leveling<\/h3>\n<p>Because of \u2018wear leveling, <strong>neither remote wipes nor factory resets<\/strong> are guaranteed to <strong>remove all the data from<a title=\"Solid-state memory\" href=\"https:\/\/searchstorage.techtarget.com\/definition\/solid-state-storage\" target=\"_blank\" rel=\"noopener noreferrer\"> solid-state memory<\/a><\/strong>. The blog points out that a low-cost product called <a href=\"https:\/\/web.archive.org\/web\/20140122054730\/http:\/\/www.wondershare.com\/disk-utility\/iphone-data-recovery.html\" target=\"_blank\" rel=\"noopener noreferrer\">Wondershare<\/a>, can recover data from solid-state memory. Mr. Garner claims the software, \u201c<em>recovers just about everything after either a factory reset or a local (phone operating system) delete.<\/em>\u201d<\/p>\n<p><a href=\"http:\/\/www.theglasgowstory.com\/image.php?inum=TGSe01326\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-108336 size-medium\" title=\"Many data wiping solutions don\u2019t work on solid state memory\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_wash.jpg?resize=118%2C150&#038;ssl=1\" alt=\"Many data wiping solutions don\u2019t work on solid state memory\" width=\"118\" height=\"150\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_wash.jpg?resize=118%2C150&amp;ssl=1 118w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_wash.jpg?resize=59%2C75&amp;ssl=1 59w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_wash.jpg?w=315&amp;ssl=1 315w\" sizes=\"auto, (max-width: 118px) 100vw, 118px\" \/><\/a>When a tablet is retired it is incumbent on the company to make sure that all data held on the device is adequately deleted. One problem, says Garner, is that \u201c<em><strong>Many data wiping solutions<\/strong>, more often than not, have been &#8220;&#8230;re-purposed from data wiping solutions for traditional hard disk drives,<\/em>\u201d and that simply <strong>doesn\u2019t work on solid-state memory.<\/strong><\/p>\n<h3>Three-stage process to wipe\u00a0SSM<\/h3>\n<p><strong>DataWipe<\/strong>, uses a <strong>three-stage process<\/strong>: first writing 0s in every <a title=\"Computer data storage\" href=\"http:\/\/en.wikipedia.org\/wiki\/Computer_data_storage\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">memory cell<\/a>, secondly writing 1s in every cell, and thirdly writing random 0s and 1s across every memory cell. The result, he claims, is <strong>guaranteed data erasure<\/strong> that can also provide audit, compliance, and reporting data in an industry-standard XML format that is easily exchanged with all the major DLP, <a title=\"Security information and event management\" href=\"http:\/\/en.wikipedia.org\/wiki\/Security_information_and_event_management\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">SIEM<\/a>, policy management, and <a title=\"Mobile device management\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobile_device_management\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">mobile device management<\/a> solutions solving both the technical difficulties around tablet recycling.<\/p>\n<p><a href=\"https:\/\/languagelog.ldc.upenn.edu\/nll\/?p=3806\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-108339\" title=\"difficulties around tablet recycling\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/meh-2.jpg?resize=100%2C71&#038;ssl=1\" alt=\"difficulties around tablet recycling\" width=\"100\" height=\"71\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/meh-2.jpg?resize=75%2C53&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/meh-2.jpg?resize=150%2C107&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/meh-2.jpg?resize=768%2C546&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/meh-2.jpg?w=960&amp;ssl=1 960w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>Wiping data from a PC or a first-generation Apple iPad that is being retired is important because of the enormous amount of data they can store. This makes the proper destruction of that data on the device essential before it leaves the organization. Unfortunately, IT asset disposition firm <a title=\"Retire-IT\" href=\"https:\/\/retire-it.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Retire-IT<\/a> sees that many firms simply swap the devices with new ones or merely format the drives without securely wiping the data. The <a title=\"Columbus, Ohio\" href=\"http:\/\/maps.google.com\/maps?ll=39.9833333333,-82.9833333333&amp;spn=0.1,0.1&amp;q=39.9833333333,-82.9833333333 (Columbus%2C%20Ohio)&amp;t=h\" target=\"_blank\" rel=\"geolocation noopener noreferrer\">Columbus, OH<\/a>-based firm says this leaves organizations vulnerable.\u00a0 Kyle Marks, CEO of Retire-IT <a title=\"Why wiping decommissioned IT assets should be a must\" href=\"https:\/\/web.archive.org\/web\/20150922155806\/http:\/\/www.net-security.org\/secworld.php?id=14875\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a> <em>Help Net Security<\/em> that:<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>99% of problems happen before a disposal vendor touches equipment. <\/em><em>No vendor can destroy data if they don&#8217;t receive an asset, which is <\/em><em>why we strongly encourage clients to destroy data before any move. <\/em><em>Better safe than sorry. Of course, disposal vendors should destroy <\/em><em>data (again) regardless<\/em><\/p>\n<p>Retire-IT looked at tracking data from 1,072 corporate disposal projects encompassing 233 different companies and reported some shocking figures:<\/p>\n<ul>\n<li>4 out of 5 projects (81.5%) had at least one<strong> missing asset<\/strong>.<\/li>\n<li>1 out of 8 (11.6%) had a negative variance. The devil is in the details, but nobody looks very closely.<\/li>\n<li>Only 79% of the <strong>serial numbers were matched<\/strong> with subjective matching.<\/li>\n<li>Without subjective matching, only 58% of serial numbers were matched.<\/li>\n<\/ul>\n<h3>Sanitize IT equipment<\/h3>\n<p><em>Help Net Security<\/em> offers some suggestions to help sanitize IT equipment:<\/p>\n<p>Computers &#8211; <strong>Derik <a title=\"Darik&#039;s Boot and Nuke\" href=\"https:\/\/web.archive.org\/web\/20220620032615\/https:\/\/dban.org\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Boot and Nuke<\/a><\/strong> Linux Live CD for full disk wiping. It supports many types of wiping, including the <a title=\"National Industrial Security Program\" href=\"http:\/\/en.wikipedia.org\/wiki\/National_Industrial_Security_Program\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">DoD 5220.2<\/a><a title=\"National Industrial Security Program\" href=\"http:\/\/en.wikipedia.org\/wiki\/National_Industrial_Security_Program\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">2-M<\/a> method with 3 passes.<\/p>\n<p><a href=\"http:\/\/www.theisleofwightcomputergeek.co.uk\/datarecovery.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-108342\" title=\"sanitize IT equipment\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_hammer_pc-e1570804940187-139x150.jpg?resize=102%2C110&#038;ssl=1\" alt=\"sanitize IT equipment\" width=\"102\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_hammer_pc-e1570804940187.jpg?resize=139%2C150&amp;ssl=1 139w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_hammer_pc-e1570804940187.jpg?resize=70%2C75&amp;ssl=1 70w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_hammer_pc-e1570804940187.jpg?w=274&amp;ssl=1 274w\" sizes=\"auto, (max-width: 102px) 100vw, 102px\" \/><\/a>Starting with Windows Vista (and <a title=\"Windows Server 2008\" href=\"http:\/\/www.microsoft.com\/windowsserver2008\/en\/us\/default.aspx\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Windows 2008 Server<\/a>), the Microsoft OS overwrites the contents of each sector when you do a Slow Format on your media. They recommend Microsoft&#8217;s <strong>SDelete<\/strong> for wiping files on Windows.<\/p>\n<p>For <a title=\"OS X\" href=\"http:\/\/www.apple.com\/osx\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Apple OS X<\/a> there&#8217;s the <strong>Disk Utility<\/strong>.<\/p>\n<p>On Linux use the &#8220;wipe&#8221;, &#8220;srm&#8221; or &#8220;shred&#8221; commands to securely sanitize files on most distributions.<\/p>\n<p>Printers and copiers &#8211; Consult the manual to find out how to clear the memory or use third-party software to wipe the hard drive. Which I covered <a href=\"http:\/\/wp.me\/p2wgaW-Km\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a><\/p>\n<p>Mobile devices &#8211; <a title=\"Wired\" href=\"http:\/\/www.wired.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Wired<\/em><\/a> <a title=\"Break Out a Hammer: You\u2019ll Never Believe the Data \u2018Wiped\u2019 Smartphones Store\" href=\"https:\/\/web.archive.org\/web\/20140317070738\/http:\/\/www.wired.com:80\/gadgetlab\/2013\/04\/smartphone-data-trail\" target=\"_blank\" rel=\"noopener noreferrer\">recommends<\/a> a <strong>hammer<\/strong> and don&#8217;t forget to remove the <a title=\"Subscriber identity module\" href=\"http:\/\/en.wikipedia.org\/wiki\/Subscriber_identity_module\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">SIM card<\/a>.<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li>BYOD: Preventing Breaches Can Be A Challenge (healthsecuritysolutions.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>End users cannot wipe confidential information stored on solid-state memory in Apple iPads and iPhones and may lead to data exposure or theft.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3044,420,101,1624,1819,849,1849,145,951,4,1753,1625,1626,445],"class_list":["post-44724","post","type-post","status-publish","format-standard","hentry","category-security","tag-3044","tag-aapl","tag-apple","tag-blackbelt","tag-computer","tag-data","tag-erasure","tag-hard-disk-drive","tag-pii","tag-security","tag-server-2008","tag-solid-state-memory","tag-wear-leveling","tag-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/44724","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=44724"}],"version-history":[{"count":18,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/44724\/revisions"}],"predecessor-version":[{"id":131779,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/44724\/revisions\/131779"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=44724"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=44724"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=44724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}