The easiest source for identity theft and the best identity theft protection

Computers and laptops are becoming obsolete faster than ever before. As we move more of our personal data onto computers, criminals are using the content left over on our old computers to steal our identities. There are five common misconceptions about the data stored on your old computer. While many people wonder what is the best identity theft protection, it seems the answer is right in front of them.

The best identity theft protection will surprise you

While most people think that identity theft is most likely to happen when someone physically gets a hold of their wallet or digs through their trash can, the reality is that identity theft has become much easier in recent years simply because most Americans are unaware of the dangers around the data they have saved on their computer. Most importantly, most Americans, and even computer technicians, are completely unaware of the best identity theft protection and most don’t know how data is actually stored and deleted from electronics devices.

Facts about identity theft and the best identity theft protection

United States Identity Theft Numbers up significantly since 2005 according to the U.S. Bureau of Justice Statistics
2005 – 5% of US adults reported identity theft
2012 – 7% of US adults reported identity theft
2015 – While the official numbers are not out, they are expected to be on the rise with recent cyber attacks

#1: I deleted my files, so they are no longer accessible.

This is the most common misconception about computers, hard drives, and the way data is stored. When you delete a file from your computer, while you can no longer see it in Windows or on your desktop, the data remains stored on your hard drive. It stays there until your computer needs to use that specific part of the hard drive for storing new content, which often takes years or even a lifetime. This is something you can easily test by saving a large file, such as a video, and then deleting it. You will notice that saving the file will take five to ten times longer than deleting it. That is because during the saving process, your computer actually stores all of the data. However, during the deletion process, your computer does not remove all of the data from your hard drive, thereby leaving 99% of that file remaining on your hard drive. Simply deleting your files is not the best identity theft protection.

#2: I formatted my drive so a criminal cannot get to the data.

While many people make the mistake of thinking that formatting a hard drive or wiping it completely clean eradicates the data, this is simply not true. The reason is that your operating system is much more interested in getting the job done fast and allowing you to get back to work, than ensuring 100% eradication of data. As hard drives have increased storage capacity into the range of 1TB and above, eradicating the data completely from a hard drive takes a minimum of several hours. Therefore, operating systems such as Windows, Mac OS, and Android are not designed to delete all of the data when you format a drive. Formatting your hard drive is not the best identity theft protection.

#3: My computer is not functional, so there is no data that a criminal could get.

You may assume that just because your computer no longer turns on and functions properly, the data you used to have stored on that computer is completely gone. However, the data stored on a hard drive is not the same as the operating system of the computer. Since most computer-related issues pertain to hardware other than your hard drive or the operating system, even if you cannot turn on your computer or start the operating system, a criminal can easily access the data you stored on that hard drive. Throwing away an old laptop or computer that no longer works without complete eradication of the data is one of the easiest ways of handing a criminal your personal data and allowing them to steal your identity so it’s definitely not the best identity theft protection.

#4: I don’t store anything confidential on my computer, so there is no data risk.

In the 1980s and 1990s, most of the personal data stored on your computer was data that you personally typed into the keyboard. Today however, that is not the case. Most of the personal data stored on your computer is stored passively and without your knowledge by web browsers, cloud providers, and other programs running on your system. Your browser is consistently storing “cookies” on your computer and other files containing much of the personal data you are accessing online. Therefore, when you access a bank account or an email address from your computer, even if you are not storing files onto your computer, your browser is automatically storing much of that data on your hard drive without your knowledge.

#5: I’m recycling my computer, so I know my hard drive will be destroyed.

A very common misconception is for people to think that the process of “recycling” is the same as the process of “destruction.” This is simply not true. The Environmental Protection Agency promotes a program of Reduce, Reuse, Recycle, which means that an electronics recycler should make every attempt to put your old electronic devices back into reuse, instead of tearing them apart for the commodity values.
Therefore, in order to ensure complete eradication of your data, it is critical that you work with certified e-waste recycling company and ask that they provide you with a certification confirming complete eradication on the data on your hard drive. This certificate should include the serial number of your computer, laptop, or mobile device, the serial number for your hard drive, and the exact time and method used to eradicate your data. The most certain method for data eradication and destruction is physical shredding. However, a multi-pass wipe completed by a certified firm can be almost as secure and is acceptable if confirmed by a certification document.

So What is the Best identity Theft Protection?

When it comes to the data on your electronic devices, it is a big mistake to try to cut corners, time, or costs. Make sure you protect your identity, personal information, and all of the content on your device by using only certified firms and always insisting on a certificate of data destruction. Doing your research and using a certified vendor for the destruction of your data is unquestionably the best identity theft protection technique. Anything less will put you and your personal data at risk.

By Arman Sadeghi

Sources:
https://en.wikipedia.org/wiki/Identity_theft
https://www.allgreenrecycling.com/secure-data-destruction/

Share this story

Post a comment

*
*

[gravityform id="20" title="false" description="false" ajax="true"]