What Actually Happens to Deleted Data?

How is Data Deleted? The answer to this question heavily depends on the hardware that the data in question is stored on. Storage media comes in two types: hard disk drives (HDDs), or solid state drives (SSDs). These two options function through vastly different methods: HDDs are mechanical devices that feature a spinning platter upon which a mechanical arm writes and overwrites data. SSDs save data via flash memory to chips, where it can be read very quickly, which also eliminates the need for any moving parts. This single difference is the source of many others that often make one storage device the better option over the other. However, we?re here to talk about removing data from these devices, not adding to it? but as it turns out, this isn?t such a straightforward process where SSDs are concerned. Not All Data is Deleted the Same Way HDDs Have a Relatively Simple Process If you?re using a hard disk drive, deleting data is relatively simple. The arm is positioned over the disk in the appropriate spot and marks the data written there as ?to be overwritten.?  Like we said, simple. SSDs are a Little More Complicated Because SSDs use flash data, they can?t just be overwritten. The existing data on the cell needs to be erased before any data can be added back?but this takes valuable time and could slow things down. This is why SATA-capable SSDs can use TRIM. TRIM is a command that informs the SSD which data blocks can be erased, helping extend the life of the drive and making the entire process more efficient. SSDs have an internal operation called garbage collection where valid data is moved from a block that contains data to be deleted. TRIM adds to this process by preventing discarded or otherwise invalidated data from being copied, allowing the SSD to ignore certain data points during garbage collection and thereby reducing the number of write cycles the SSD will be subject to. This all happens in the background, too, so you can keep working with the confidence that you?ll have the storage space you?ll need.  If you?re using Windows, TRIM is enabled by default, replacing Disk Defragmenter. Can You Trust that Your Data is Really Gone? Unfortunately, the answer can be more challenging than you?d expect.  In an attempt to preserve the longevity of the SSD, the SSD will fib to the OS a little bit in terms of which data blocks are available so that the different cells age at the same rate. This is called wear-leveling, and makes it totally plausible that certain blocks weren?t really trimmed through TRIM, simply because the SSD is trying to preserve itself. In addition, TRIM involves some buffer space, which could very well contain recent data as well. So, You Can Sometimes Be Somewhat Confident that Your Data is Deleted (but Not Really) Don?t get us wrong, your files will generally be deleted. However, you can only be so sure about that?and don?t get us started on security. This is all critical to keep in mind when you?re planning to dispose of a device, particularly when you plan to donate it or resell it. Lean On Us for Assistance with Your Hardware Refreshes While upgrading your business? technology is a great way to ensure it […]

Training Your Staff Isn?t an Overnight Task

On the surface there is nothing abnormal or wrong about this scenario. The problem, however, is that dropping a new hire into real-time, important situations?the trial by fire scenario?may not be the best way to get them up to speed. In this month?s newsletter, we are going to discuss how creating a sustained training platform can actually have a marked effect on your business? ability to stay secure and productive.  Different Avenues of Training The first thing that should be mentioned is that dedicating a lot of time and resources to employee training can definitely become expensive quickly. It is definitely one factor into why many organizations have a lackluster training platform. There are five major types of training that most organizations offer, they are: Orientation Every business has some form of orientation. This is a short run down of the expectations of an employee by management. Orientation will show new hires all the relevant information about what it means to be an employee at the company. Some businesses go into detail about things like the company mission, values, corporate culture, leadership information, employee benefits, administrative procedures, and any other tasks that need to be completed before any actual training begins.  Mandatory There are some things that workers need to know, regardless of the position they hold. Some mandatory training is dictated by federal and state governments, while others are strictly industry-wide points of emphasis. Public-sector jobs often are required to take occupational health and safety courses. This practice is becoming more and more prevalent in the private sector, as is sexual harassment training. Onboarding Onboarding is different from orientation. When you are onboarding your employees, you train them in the specific duties their job entails. This could be training on the software they?ll need to be accustomed to using, or training on how your business wants them to complete specific tasks. The idea is to make new hires as effective as possible, as quickly as possible. Some jobs come with a half-a-day of onboarding, while others take over a year to complete.  Operational Skills Skills training is designed to improve an employee?s ability to do the work, or to fill in other positions in your company. There is soft skills training and technical skills training. Soft skills training is designed to improve an employee?s ability to interact with others; and, with the company. These skills include: Presentation and communication Problem solving Conflict resolution Time management Collaboration Emotional intelligence Adaptability Studies have shown that a dedication to soft skills training works to resolve the normative problems with high turnover and unsuccessful collaborative culture. Technical skills training enhances the technical proficiency of an employee. Any time employees can get better at the technical aspects of their jobs, it improves the products and services the company they work for delivers.  Security Nowadays, with the circumstances that modern workers have to consider, security training is an absolute must. Not only does it improve employees? ability to protect business assets, it ensures that they are aware of the potential problems that the modern business is exposed to.  Physical security training is typically limited, but if it is a major part of a person?s role within your company to keep assets secure, they should be given the information needed to accomplish this task.  What?s more […]

Ransomware Costs You More than Just the Ransom

According to Those Who Paid Up, the Ransom Wasn?t the Worst Part According to a survey that Software-as-a-Service review site GetApp conducted of 300 business leaders whose businesses had been victims of ransomware, only 11% of respondents considered the ransom payment itself to be the most consequential impact. Multifaceted extortion is becoming a favorite tactic of many attackers, with 60% of those surveyed having experienced it in tandem with the ransomware attack. In addition to locking down the target?s files, an attacker will often steal them and later threaten to leak them on the Internet unless another payment is received. Alternatively, a business may be targeted by a distributed denial of service (or DDoS) attack?where an attacker floods their target?s servers with traffic, overloading them and crashing their website and exposing them to potential data breach. This kind of multifaceted extortion has also proved very effective indeed. Whereas the survey found that only about 31% of those targeted by ?vanilla? ransomware would pay up, that rate nearly doubled when multifaceted extortion came into play. In those cases, 58% of targeted businesses shelled out the ransom. According to GetApp, 64% of the businesses they surveyed who had experienced multifaceted extortion were struck by ransomware and DDoS traffic, 51% were hit with ransomware and data theft, and 23% had to deal with all three. We Still Haven?t Gotten to the Worst Part Believe it or not, those businesses that GetApp surveyed didn?t see the actual ransom payment as the worst of their experienced impacts. In fact, only 42% did, with 21% seeing minimal repercussions from it. The same went for the reputational impact that these businesses saw?slightly more saw major impacts at 43%, but more also saw no or minimal impact at 26%. Far and away, GetApp?s research indicated that the biggest impact, felt by the most businesses as a result of their ransomware infection, was the lost productivity they suffered. A full 70% of surveyed businesses ranked the effect ransomware had on their productivity as a major impact, with just 13% saying the impact was minimal. And no wonder? ransomware can potentially render your entire business inert for the time it takes to resolve the threat and restore from a backup. The vast majority of those surveyed (69%) also found themselves cut off from their business systems for at least seven hours, 8% dealing with the attack for at least a week. We also need to discuss the fact that ransomware can also lead to a loss of clients. 62% of surveyed business owners confirmed that ransomware had lost them a client, with 38% stating that multiple clients had left them. Whether or Not the Ransom is Paid, Ransomware is Expensive All of these factors combined, it is little wonder that ransomware is an extremely costly attack to deal with. Out of those surveyed, 49% of those that paid had costs over $50,000, all said. However, the same could be said for 34% of those that didn?t pay. Ransomware is Better Avoided So, since it is clear that ransomware is something that it’s best not to have to deal with at all if you can help it, let?s dive into how you can help keep it from darkening your doors. Prevent Phishing Attacks Phishing is no joke on its own, and […]

What is an Inventory Management System?

The Basics of Inventory Management Inventory management is just the process of controlling the resources and products your business has to meet the demands put on your business by its customers. Much is made about the supply chain issues that have happened over the past couple of years and a business that has a solid grasp on their inventory management can proactively act to mitigate some of the issues brought on by these supply chain interruptions. It?s important to have a clear understanding of what resources you have and what products you have ready for sale. Ultimately, the way that your business handles its inventory can help with transparency, can help reduce costs, and can provide a better customer experience. Inventory Management Considerations For any business, there are four types of inventory that you have to consider. Obviously, the priority will change depending on the type of business you run, but the four types are: Raw Materials: The goods needed to produce whatever you are selling to your clients or customers. Works in Process: The goods that are not currently finished, but in process, perhaps awaiting additional materials or processing as permitted by the workflow. Maintenance, Repair, and Operations: These are goods that are used to support the creation of your goods, from raw materials to finished goods. Finished Goods: Goods that are ready to head out the door to generate revenue for your business. Obviously, there are many different ways you can manage your inventory, but today some of the most innovative tools are being used to keep your inventory management on point. Some robust inventory management systems include artificial intelligence to help automate a lot of your procurement and active management; Internet of Things technology to help track inventory levels and assets throughout the supply chain, and applications that integrate with your mission-critical software to help you manage everything.  Business moves fast and having the technology that helps you manage your inventory in real time can work wonders for your business. To learn more from the IT consultants at White Mountain IT Services reach out to us today at (603) 889-0800.

Identifying a Data Breach Can Be a Challenge

The Value of Your Data Your business will always possess valuable data that hackers want to get their grimy hands on. It doesn?t matter how big or small your company is, which industry you fall into, or what type of data you store; you always, always have something of value to hackers, whether it?s personal records of your employees or financial information of your clients. This is why you need to take measures to protect your data, especially your own. Password Managers Offer Some Assistance If you utilize a password manager for your business, you might have alerts set up for if someone uses a password stored in your databases. While not all solutions offer these robust features, it?s best to check if they do before you commit to other types of solutions. Run a Credit Report or Check with Monitoring Agencies Sometimes you might encounter bizarre charges on your credit cards or bank statements that you did not authorize. In cases like this, you might be notified by your bank that someone has used your credentials or card. Credit monitoring can also be an effective way of seeing if anyone has used your identity to open new lines of credit, like cards or accounts. If this happens, then someone for sure has your sensitive information. Use Have I Been Pwned Have I Been Pwned is a tool created by security expert Troy Hunt. It works like a search engine; all you do is type in your email address or phone number to see if they have been leaked online. It then returns results for data breaches you might have been involved in. Now, the best way to ensure that your data isn?t breached is by working with cybersecurity professionals like White Mountain IT Services. We can?t control the companies you work with, but we can help you keep your own infrastructure safe. To learn more about what we can do for your organization, call us at (603) 889-0800 today.