One of the revelations to come out of the Hillary Clinton’s private server use during her time at the State Department is that her aides destroyed some of her electronic devices without really knowing how to properly secure the information stored on those devices. This is detailed in a recent article in Wired Magazine.
One of the major points in the article is that you can take a hammer to a Blackberry, but that doesn’t mean the information has been destroyed. The chip containing everything could have survived intact and could easily be accessed in another device. For an information security program to be effective, it must recognize the range of storage media and type of information being used in an organization. Then policy must be put in place adequate to protect each type. The Federal Government has a strong information security program, but if you are involved in a private organization, state, or local government struggling to deal with all of this, we understand. We get calls about this every day.
To help deal with the basic questions, we put together a resource you may want to consider. We call it our Information Sanitization and Destruction Pocket Reference Guide. The guide has a directory at the beginning listing various types of media (including paper) and guides you to the individual sections detailing sanitization methods. Shredding, disintegration, degaussing, punching, and crushing are all discussed. This guide is updated annually as laws, standards and technology change. Printed quantities are available for your security meeting or event. Just send us a note or pick up the phone (800-225-9293).