Protecting your confidentiality when disposing of a computing device can be worrisome. Joseph Moran discusses the options .
This obviously presents a major problem when you need to dispose of PCs via sale, donation, or recycling, send equipment in for service or return leased hardware to a vendor (dont forget printers and copiers), or just when reallocating systems within a company. Even if a system isnt going anywhere, the persistence of deleted data, especially if of a sensitive nature, represents a real security risk.
Whatever the scenario, the only way to have any assurance that data you intend to erase is really gone is to overwrite it or wipe it.
Read the rest at eSecurity Planet.
One of the ways around the issues of security and control that make some businesses wary of cloud computing is to build a private cloud -- one that remains within the corporate firewall and is wholly controlled internally. Private clouds also increase the agility of IT an organization's IT infrastructure and make it easier to roll out new technology projects. Download this eBook to get the facts behind the private cloud and learn how your organization can get started.