Let’s look at the risks and considerations when choosing how to best 
secure data on your no-longer-wanted IT storage assets.
In its landmark 2022 article, “Why Big Tech shreds 
millions of storage devices it could reuse,” the Financial 
Times investigated global data center growth, 
organizational policies—and the routine destruction of 
related data storage assets.
Their findings?
Largely motivated by the fear of data leakage and data 
privacy violations, IT leaders worldwide—including 
cloud providers—contribute to an immense amount of 
drive destruction in the name of data security.
And it’s no wonder.
IBM recently reported that the average cost of a data 
breach exceeded $4M in 2023. Yet that’s dwarfed by a 
device disposal breach that resulted in more than $90M 
in fines alone, not including millions more in a hefty legal 
settlement.
Yet today’s businesses regularly put their data at risk 
at this stage. Often, data protection processes are 
outpaced by the technologies they’re designed to 
protect.
In an era of escalating data consumption, blank is 
change. More importantly, it’s effective. 
Here’s how it holds up against traditional practices—and 
how you should use it to protect your data
															Properly sanitizing the data from your used desktops, 
laptops, servers, loose drives, mobile devices, flash 
drives, or any other storage device is absolutely critical 
when it comes to decommissioning, no matter what the 
end destination (Redeploy? Sell? Donate? Recycle?) is 
for those devices.
That’s because even if the once-valuable data is 
completely obsolete or trivial to your organization now, 
it can still offer a goldmine for hackers and black market 
data brokers
Whatever the catalyst for drive disposal, an organization 
risks data leakage if data can be found or reconstructed 
from discarded storage devices or their components. 
That could lead to heavy fines from regulators. It can 
breed lawsuits by those affected. There’s also the risk of 
financial loss and reputational damage
Blancco defines data sanitization as the process of 
deliberately, permanently, and irreversibly removing 
or destroying the data stored on a memory device 
to make it unrecoverable—a definition in line with 
Gartner’s Hype Cycles. A device that has been sanitized 
has no usable residual data. Even with the assistance 
of advanced forensic tools, the data will not ever be 
recovered.
According to Gartner, there are three methods to 
achieve data sanitization:
• physical destruction, 
• cryptographic erasure, and 
• data erasure.
															We address the pros and cons of cryptographic erasure 
in our white paper, “The Crypto Erase Conundrum: 
What’s Your Organization’s Risk Tolerance?” But in an 
era where shredding drives and degaussing are often 
the “go to” methods of final drive destruction, how 
do you know the best sanitization method for your 
organization—and whether to choose between physical 
destruction or data erasure for your most sensitive 
information
If you’ve already determined that your data storage 
devices require the utmost in protection at end-of
life, feel free to jump to the end of this article for our 
recommendation on how to treat your storage devices 
at that time.
Otherwise, to determine how secure your data disposal 
processes need to be and whether to choose data 
erasure vs. physical destruction, consider the following
• Data confidentiality and impact
• Persistence of data sensitivity
• Drive or device final destination
• Determination and capabilities of your adversary
Data security rests on three fundamental objectives: 
Confidentiality, Integrity, and Availability. 
Among other places, these are outlined in the U.S. 
document, Federal Information Processing Standards 
(FIPS) Publication 199, “Standards for Security 
Categorization of Federal Information and Information 
Systems (PDF).”
Created in response to the Federal Information Security 
Management Act (FISMA) of 2002, this publication from 
the National Institute of Standards and Technology 
(NIST) weighs each of these three attributes according 
to risk of impact (low, moderate, high) when determining 
the amount of data protection needed
For instance:
When it comes to end-of-life data protection, 
Confidentiality is the chief concern. This is particularly 
true when unauthorized data exposure could cause 
great financial loss, brand damage, or other harm if 
made available to the wrong people.
															Will the sensitivity of your data quickly age out?
The NIST SP 800-88, Rev 1, “Media Sanitization 
Guidelines” recommend that, for disposition decision 
making, “it is important to understand what types of 
data may be stored on the device in order to apply the 
techniques that best balance efficiency and efficacy to 
maintain the confidentiality of the data.” Also, “the length 
of time the data will remain sensitive should also be 
considered.”
Just because the data is sensitive now, will its value 
diminish quickly enough that it will soon be worthless to 
nearly everyone?
Or will the information you need to protect still be 
considered high-risk or highly confidential for months or 
years to come?
This can be important to consider as data recovery 
techniques advance. More sophisticated data recovery 
tools and skills will also become more commonplace. 
These factors may also influence whether you want to 
meet or exceed bare minimum regulation requirements.
For data that will remain sensitive or valuable for some 
time, you’ll want to know that you’ve successfully 
removed all data from devices and device fragments for 
both now and in the future.
When it comes to high-risk data storage, moving 
devices from a more securely protected data 
environment to a lesser one is risky.
Typically, even if the data on an old drive has been 
previously declared confidential, if the drive is to be 
reused within the same organization, the risk of data 
exposure to external parties is lower than if the drive 
was reused externally. Even so, if the drive is to be 
redeployed in-house, it still must be thoroughly sanitized 
in a way that protects the data while preserving the life 
of the drive.
This allows a drive previously used by say, the 
finance department, to be redistributed to a different 
department without fear of employee salaries and bank 
account information being exposed internally.
However, once drives leave the organization, the 
organization is no longer in control of any potential data 
access. Any residual data may be exposed long after the 
organization has relinquished it to other owners.
															The truth is, any of the three data sanitization 
procedures—data erasure, cryptographic erasure, 
physical destruction—will protect your data if executed 
properly from the beginning to the end of the process.
Costs, environmental impact, and the ability to reuse 
your devices will differ, of course. But for any enterprise 
especially concerned about protecting data at end
of-life, trouble occurs when any of these data disposal 
methods are performed incorrectly
At that point, data sanitization remains incomplete, and 
data is still recoverable by someone with adequate know 
how and the right tools.
The value of your data, how much of a target your 
organization’s data may be, and the capabilities of 
those who would benefit from your data must also be 
considered as you weigh your risk and choose your data 
disposal methods
Subversive data access methods can be divided into 
two primary categories
With the most notorious data access crimes committed 
by well-funded teams of malicious actors (rogue nation 
states, crime syndicates, etc.), advanced data recovery 
using extraordinary means can be a very real possibility 
if your data is valuable.
So how do you ensure that your highly sensitive data is 
undoubtedly, permanently, and completely protected 
from the moment of device decommissioning?
The answer: Use a combination of physical destruction 
and secure data erasure for end-of-life drives that have 
stored your most confidential, high-risk data—but only if 
sustainable reuse truly isn’t an option
With e-waste continuing to be an issue worldwide, and 
global data consumption accelerating, reuse is the most 
sustainable option when it comes time to retire data 
storage devices.
With the right methods and levels of software-based 
sanitization (data erasure), data is permanently rendered 
inaccessible while leaving the device intact. This 
prevents usable devices from prematurely heading to 
landfill, something physical destruction cannot do. 
But there are other drawbacks to physical destruction 
that can also make it a less secure option
															Done correctly, physical destruction is a valid data 
disposal option. It can sometimes be the only option for 
damaged drives and devices.
But it’s unnervingly easy to take missteps or leave gaps 
that can put your data at risk. And, with data being stored 
at ever greater densities, commonly accepted, so-called 
“military grade” physical destruction techniques are 
rapidly falling out of favor
Intended to demagnetize hard disk drives (HDDs), 
degaussing doesn’t apply to solid-state drives 
(SSDs)—at all
So, if you send a batch of drives for degaussing 
assuming they’re all HDDs, you may unwittingly send 
several SSDs (or hybrid drives with SSD components) 
laden with sensitive information along with them. The 
result? When finally disposed of or recycled, the SSDs 
will still have all their original data.
What’s more, not all degaussing machines are adequate 
to the task of demagnetizing all HDDs. If using this 
method at all, we recommend checking for degaussers 
approved by your region’s security authorities (e.g., 
the NSA publishes NSA/CSS Evaluated Products List 
for Magnetic Degaussers)—and being diligent about 
separating drive types. You’ll also want to make sure 
your degaussers are new enough and capable enough 
of addressing the drives you have. 
Degaussing will render the drives unusable. However, 
note that even with approved degaussers, the 
NSA recommends additional destructive methods 
in combination with degaussing to achieve true 
sanitization.
While HDD destruction can be accomplished with larger 
shred sizes, the ever-increasing data density of SSD 
chips means that larger pieces can harbor readable, 
accessible data, especially if chips are left intact.
Keeping up with such data storage evolution is one 
reason the globally renown IEEE Standards Association 
developed a new data storage sanitization standard.
For those organization that require shredding or 
pulverizing, there are some important measurements 
and tactics to keep in mind:
For all drive types, the idea is to shred small enough 
so that recreating the data from fragments would be 
infeasible. Additional security comes from mixing the 
particles with those of other drives
IEEE 2883 does include melting or incinerating as 
legitimate, fully effective forms of drive sanitization 
and data protection.
															Whatever physical destruction method chosen, there 
are still other operational vulnerabilities, even if the 
correct data disposal processes are followed precisely 
for each drive type.
For instance, in any physical destruction scenario, 
unless you have rock-solid chain of custody measures 
in place, you introduce risk of loss or theft by leaving 
devices in storage until they’re finally handled, or by 
giving a third-party data destruction service access to 
your devices.
Whether destruction is conducted at your facility with 
mobile shredders or degaussers or transported to an 
IT asset disposal (ITAD) facility for ultimate physical 
destruction, there’s risk in relying on this method alone 
since there are many points of vulnerability, including 
people and process vulnerabilities and the risk of loss or 
theft.
One way to do this is to carefully vet the vendors 
providing drive destruction services, from
Applying these practices when looking for a data 
destruction vendor will help ensure that you’ve 
minimized the chances of data being susceptible to 
breach and provided you with the assurance that you 
are working with a reputable vendor that is highly expert 
in protecting your data.
Physically destroying hard drives, computers, mobile 
devices, and other storage devices is viscerally 
satisfying.
While data erasure has been proven both secure 
and effective, fully able to completely eliminate data 
without destroying the device itself, there’s something 
reassuring about seeing drives mangled beyond 
recognition.
However, because subpar physical destruction 
processes can leave data vulnerable, it’s still wise to 
first perform secure and complete data erasure on any 
device used for confidential data—even if you intend 
to shred, pulverize, or recycle the drive or device rather 
than reuse it.
Because subpar physical destruction processes can 
leave data vulnerable, it’s still wise to first perform 
secure and complete data erasure on any device used 
for confidential data.
However, this “belt and suspenders” approach incurs 
several needless costs: time, money (both processing 
and replacement costs), and waste.
With automated data erasure, especially if performed 
at the point of decommissioning, you can safely retire 
storage assets, no matter the final destination, without 
fearing human error, unintentional loss, or deliberate 
hacking. 
But after devices have been certified and verifiably 
erased, secure device reuse is a real option.
															Whether redeployed internally or externally, verified 
software-based sanitization renders data inaccessible, 
extends the life of IT assets, keeps functional devices 
out of landfill, and extracts more value from your IT 
investment.
After 25 years of sanitizing drives and devices with 
Blancco software, millions of erasures, rigorous and 
regular testing by third-party organizations, and a record 
of zero breaches, the effectiveness of data erasure in 
protecting against illicit data access is proven. 
Also, because software-based data sanitization can 
be launched immediately across thousands of devices 
at a time and even remotely, you can use it to protect 
your data right at decommissioning for even large-scale 
projects.
This reinforces your chain of custody and shields your 
sensitive information throughout any transit or storage 
time. The data is simply no longer accessible by anyone
One caution:
There are also faulty implementations of “wiping” 
(privacy for sale) data from hard drives: Overwriting may 
not reach all sectors (they may be hidden or damaged) 
or manufacturers’ built-in sanitization processes may 
not be implemented correctly.
Lesser attempts at removing data, such as reformatting 
(low-level format) or simply deleting files, are completely 
inappropriate for even slightly sensitive data. With these 
methods data can be recovered fairly easily.
Just as care should be taken when selecting a drive 
destruction provider, it’s important to choose your 
erasure software-based data destruction solution 
carefully, and insist on both erasure verification and an 
audit-ready, tamper-proof report. The report will identify 
each drive and the method and level of erasure used, 
among other details critical to chain of custody and 
compliance reporting.
carefully. Then, use the points in this article to advocate 
adding data erasure as an extra layer of protection 
against future data access.
Blancco data erasure software has been tested, 
certified, approved, and recommended by 25+ 
certifications (Our supported standards) around 
the world. Our data erasure software erases to 25+ 
standards and provides certificates of erasure to meet 
security and regulatory compliance requirements. 
And, our patented SSD solution handles functionality 
differences across a myriad of SSD vendors.
We are confident that Blancco data erasure solutions 
(Blancco’s erasure solutions overview) provide all you 
need for permanent, secure data sanitization, rendering 
your data completely unrecoverable.
And, because the drive or device remains physically 
intact, Blancco data erasure gives you the ability to 
redeploy your data storage assets—and operate more 
sustainably (sustainability) — without fear of data 
leakage at any time.
However, if your organization mandates or prefers 
physically destroying your old data storage devices, 
weigh your destruction methods and vendor options 
At Blancco, we have enterprise-scale solutions that permanently and completely eradicate your data, 
getting your devices and environments completely blank—with or without physical destruction.