Home Page Navigation Contents Contact Sitemap Search

Correctly erasing your data to dispose or pass on your device

Simply deleting the content on a device is not enough. Attackers can gain access to user accounts via disposed or resold devices on which data has 'only' been deleted.

Electronic data remains on the storage medium even after deletion or emptying the recycle bin. Only the information on the storage location in the internal table of contents of the hard disk is deleted. For the final destruction of the data, the storage location of the information must be overwritten several times and randomly. Dedicated programs are available for this process. When used correctly, the hard disk is reliably erased so that data cannot be recovered even with recovery tools.

Before erasing, you should remove linked accounts (Apple account, Office 365 account, etc.) from your device and log out of all applications.

Modern operating systems have dedicated functions to reset the computer or mobile device and prepare it for disposal or resale. However, to achieve a reliable deletion of your data on a hard disk, it is recommended to additionally randomly overwrite the hard disk several times with a specialized program. The recovery data of the device manufacturer should also be overwritten in the process.

If the device is not to be used further, a physical destruction of the data media can also be carried out. However, the storage devices must first be removed from the device, which can be time-consuming.

For further information on this topic, see our article "Secure deletion".

 

What else would you like to learn about security when e-banking?

Register for a course now
and learn more:

Online basic course

Find out about current Internet threats and some easy protective measures, and how to securely use e-banking.

further information

Online course mobile banking/payments

Find out about mobile banking, mobile payments and how to securely use these apps.

further information

Online course on cryptocurrencies

Cryptocurrency beginner? Find out about the most popular cryptocurrencies and the Blockchain technology behind them.

further information

Online course for SMEs

Is your organisation sufficiently secure? Learn which measures you can take to significantly strengthen your organisation’s IT security.

further information