Data Destruction and End of Life Data Management

With today’s ‘IoT’ (Internet of Things),  the amount of data stored on media storage devices is almost impossible for us to fathom. A staggering amount  of that data is referred to as Personally Identifiable Information or ‘PII’. Personally Identifiable Information can range from something as simple as an individual‘s name or email address to an individual‘s financial information, medical records, social security number, criminal history and other personal data that hackers can use to steal money and identities (see our article – Your Data – who wants its, why they want it, what it costs if they get it) .

Data breaches can often expose PII which can seriously harm individuals, by contributing to identity theft, blackmail, or embarrassment, and the organization, by reducing public trust in the organization or creating legal liability[1]. The number of data breaches is on the rise, as we see in the news almost daily.

The cost of data breaches is also rising. According to the Ponemon Institute study released in May of 2014, the average cost per record for a data breach is $201 and the average cost per breach is $5.9 million[2]. This has been the driving force behind privacy laws designed to protect personal information.

Why Data Destruction / Eradication?

 Let us introduce the Data Security Management Lifecycle and the different stages of data; origin, rest, motion, use, and end-of-life. Data breaches or data theft can occur at each one of these stages. One very often overlooked stage is the End-of-life, or EOL.



Servers, Computers, Portable Hard drives, Cell Phones, Thumb drives, CD/DVD/Blu-Ray, Tapes, Tablets, and on and on… All these devices have the potential to leak protected data from your organization when the are replaced or discarded. Think that old server that died or you virtualized doesn’t have any data on it? Think again.. That iPad that fell in the pool has to have no useable data on it correct? Not so. We have recovered data from devices of all sorts and conditions, including media immersed in salt water. The only way to assure that your end-of-life IT Assets are clear of any and all data is to have them professionally eradicated by a company like Cybersecurity Defense Solutions.

Hammered Drive
Yes, we can even recover the data on this drive… Don’t abuse, reuse!

Our End-Of-Life Data Destruction services cover all media types including hard drives, flash media, optical media, tapes, cell phones, tablets, SSD’s, and more. Our facilities and staff are capable of accommodating eradication jobs of any size.

Our equipment and techniques conform to NIST SP 800-88 specifications and meet or exceed HIPPA, HiTECH, SoX, GLBA, FACTA and others. All services are performed by qualified engineers who are local and have passed comprehensive background investigations. You can rest assured that your data is being protected before and during the eradication process.

Whether you are selling your computer on an auction website, giving it to a relative, or donating it to a local church you need to ensure that your privacy is protected. Technology has made retrieving data from storage media easier than ever before. Anyone with internet access can download free tools to retrieve personal data and then exploit it!

Cybersecurity Defense Solutions Certified Data Destruction can give you peace of mind that your sensitive data stored will not fall into the wrong hands. As a business you are not just protecting your information but that of your customers as well.  We can perform the service at your location or ours and once we destroy the data we will provide you with a certificate of destruction to ensure you meet compliance requirements.

Contact us for more information or a quote on our Certified Data Destruction and EOL services.



[1] National Institute of Standards and Technology; Guide to Protecting the Confidentiality of Personally Identifiable Information

[2] Ponemon Institute; 2014 Cost of Data Breach Study: United States