Ep. 166 The most important tech question that nobody asks
Data Destruction?
Find out more about data destruction best practices for federal agencies here.
https://securis.com/government-agencies/
Want to make the most out of your next podcast appearance? https://content.leadquizzes.com/lp/fk1JL_FgeQ
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/
Want to listen to other episodes? www.Federaltechpodcast.com
What happens to sensitive information on electronics when they are replaced?
Most tech conversations today focus on the feats of Artificial Intelligence. Reports are generated, software is written, and predictions are made. However, few understand the e-waste implications of this tidal wave.
To start with, AI requires an incredible amount of computational power. If you combine that fact with the typical computer refresh cycles then we have a growing situation where federal agencies hard drives and SSDs with sensitive information that must be disposed of properly.
Sensitive information is not just stored on computers and networking equipment in data centers, we have it dispersed on tablets, mobile phones, laptops and even Navy ships.
You may ask – how often does sensitive information get out? A recent study has shown that 40% of used computers purchased on popular ecommerce sites had personally identifiable information on them. Governments and financial institutions have been embarrassed or fined for data breaches.
Our conversation today is with “Sal” Salvetti from Securis. His company provides a service that can take end of life computers, phones and tablets and dispose of them in a secure and sustainable manner.
Federal agencies have to comply with directives from GSA, DLA, NSA and NIST (800-88) around the proper disposal of end of life electronic devices.
In the interview, we learn how Certified Secure Data Destruction Specialists (CSDS) from Securis can help your agencies comply with federal guidelines and protect national security.
Many federal managers don't understand the full asset management lifecycle of hardware and the cyber security risks. Don’t treat old computers like trash.
The conversation provides best practices concerning when software can be used to wipe data and when devices or drives should be shredded. You will also learn why certifications from the National Association of Information Destruction (NAID AAA) R2 are critical for ITAD (IT Asset Disposal) providers.
Information
- Show
- FrequencyUpdated Weekly
- PublishedJuly 26, 2024 at 5:38 AM UTC
- Length25 min
- RatingClean