Protecting Data on Old Devices You Don’t Use Anymore | CISA (2024)

The Bottom Line

If you are trying to protect sensitive or personal data that you no longer need, simply “deleting” that data or destroying the device will not guarantee that it has been permanently erased. For optimal data protection:

  1. Encrypt your devices and storage media (e.g., hard drives, thumb drives) to protect all of your data, including deleted data.
  2. Don’t sell or recycle old devices, particularly if you consider yourself to be high risk, and instead store the device in a secure location, such as a safe.

The Problem

Deleting sensitive or personal data to deny threat actors access is often an ineffective strategy.

When you “delete” a file from your device, it is often still recoverable.

When you move data to the “recycling bin” or “trash” on a device that uses Windows OS, macOS, Android, or iOS, that data is not permanently deleted. The operating system (OS) simply allows that data to eventually be overwritten (i.e., replaced) with new data.

You can’t be sure that the data you have deleted was actually overwritten. As a result, threat actors with the right know-how can recover parts of files―or sometimes even entire files―that you thought no longer existed, allowing them access to any sensitive or personal information contained within.

This also means that if you sell, recycle, or trade in an old device, your sensitive files may remain if all you did was hit the delete button and empty the recycling bin or trash can. Alternatively, if you try to “destroy” a device yourself, critical portions of the hardware may survive destruction and enable data recovery.

The Solution

For devices that you are currently using …

Encrypt your devices (e.g., computer, phone, tablet) and storage media (e.g., thumb drives, hard drives).

By encrypting your devices and storage media, you prevent threat actors from reading, manipulating, or stealing the data stored on them. Project Upskill Topic 3.0 for guidance on setting up system encryption.

For devices that you are no longer using …

Storing old devices in a secure location (e.g., a safe) is the most effective method of data protection.

However, if you plan to destroy your device, it is best to find a professional recycling or destruction service that will allow you to verify that the device’s hard drive has been destroyed.

Particularly for high-risk communities, it is not advisable to sell or recycle devices containing sensitive or personal information. However, if you plan to do so, you should encrypt your device first. (Project Upskill Topic 3.0)

If you do intend to trade in a device, follow your manufacturer’s guidance for securely wiping the device:

Takeaways

Do

Do Not

  • Use deletion as your primary strategy for protecting sensitive or personal data that you no longer need.
  • Recycle or sell your device if you consider yourself to be at heightened risk of targeting by politically or ideologically motivated threat actors.

Project Upskill is a product of theJoint Cyber Defense Collaborative.

Protecting Data on Old Devices You Don’t Use Anymore | CISA (2024)
Top Articles
RRIF Withdrawal Rates and Rules
How to solve the top data warehouse challenges | Secoda
Melson Funeral Services Obituaries
Walgreens Pharmqcy
Kobold Beast Tribe Guide and Rewards
Oppenheimer & Co. Inc. Buys Shares of 798,472 AST SpaceMobile, Inc. (NASDAQ:ASTS)
Jcpenney At Home Associate Kiosk
Tokioof
What Is Njvpdi
Lenscrafters Huebner Oaks
6001 Canadian Ct Orlando Fl
Studentvue Columbia Heights
VMware’s Partner Connect Program: an evolution of opportunities
Interactive Maps: States where guns are sold online most
Beebe Portal Athena
Napa Autocare Locator
List of all the Castle's Secret Stars - Super Mario 64 Guide - IGN
Milspec Mojo Bio
Lcwc 911 Live Incident List Live Status
Buy Swap Sell Dirt Late Model
Erica Banks Net Worth | Boyfriend
Azpeople View Paycheck/W2
12 Top-Rated Things to Do in Muskegon, MI
Sullivan County Image Mate
Is Holly Warlick Married To Susan Patton
10 Best Places to Go and Things to Know for a Trip to the Hickory M...
Marlene2995 Pagina Azul
Joann Fabrics Lexington Sc
Remnants of Filth: Yuwu (Novel) Vol. 4
Superhot Free Online Game Unblocked
United E Gift Card
Haunted Mansion Showtimes Near Cinemark Tinseltown Usa And Imax
Is The Nun Based On a True Story?
The Banshees Of Inisherin Showtimes Near Reading Cinemas Town Square
Trap Candy Strain Leafly
Gifford Christmas Craft Show 2022
Hireright Applicant Center Login
Emily Browning Fansite
LumiSpa iO Activating Cleanser kaufen | 19% Rabatt | NuSkin
Watch Chainsaw Man English Sub/Dub online Free on HiAnime.to
Az Unblocked Games: Complete with ease | airSlate SignNow
Reilly Auto Parts Store Hours
Lawrence E. Moon Funeral Home | Flint, Michigan
Theater X Orange Heights Florida
Freightliner Cascadia Clutch Replacement Cost
Every Type of Sentinel in the Marvel Universe
Slug Menace Rs3
Wvu Workday
Ciara Rose Scalia-Hirschman
Sj Craigs
Texas 4A Baseball
Latest Posts
Article information

Author: Wyatt Volkman LLD

Last Updated:

Views: 5998

Rating: 4.6 / 5 (66 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Wyatt Volkman LLD

Birthday: 1992-02-16

Address: Suite 851 78549 Lubowitz Well, Wardside, TX 98080-8615

Phone: +67618977178100

Job: Manufacturing Director

Hobby: Running, Mountaineering, Inline skating, Writing, Baton twirling, Computer programming, Stone skipping

Introduction: My name is Wyatt Volkman LLD, I am a handsome, rich, comfortable, lively, zealous, graceful, gifted person who loves writing and wants to share my knowledge and understanding with you.