{"id":184,"date":"2020-12-16T06:27:34","date_gmt":"2020-12-16T06:27:34","guid":{"rendered":"https:\/\/www.shipndestroy.com\/blog\/?p=184"},"modified":"2020-12-16T06:27:34","modified_gmt":"2020-12-16T06:27:34","slug":"wipe-or-destroy","status":"publish","type":"post","link":"https:\/\/www.shipndestroy.com\/blog\/wipe-or-destroy\/","title":{"rendered":"Wipe or Destroy?"},"content":{"rendered":"\n<p>You know you need to take care of that outdated drive, but is it worth the hassle? The fundamentals of compliant data destruction include the actual data destruction, verification of the data destruction and documentation of these two processes.\u00a0 This is time-consuming. Each step is vital to complying with all major data-compliance requirements<\/p>\n\n\n\n<p>Destruction of SSDs can be categorized into two main categories: sanitization\/wiping\/overwriting and physical destruction. Each has its own unique challenges.<\/p>\n\n\n\n<p>SSD wiping is one of the biggest challenges facing data-destruction experts. How many wipes before it\u2019s really \u201cclean\u201d?\u00a0 With traditional magnetic drives, one generally has block-level access to devices. This allows you to write to each block and also verify that the block was successfully written to.This is no longer possible with SSDs. Data on SSDs is accessed through a controller. You are at the mercy of this controller when wiping an SSD.\u00a0<\/p>\n\n\n\n<p>This poses a challenge when attempting to wipe and verify the effectiveness of a wipe.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Use Ship n Destroy<\/strong><\/h3>\n\n\n\n<p>If you don\u2019t want the hassle (or the risk\u2026) of a DIY hard drive or solid state drive wipe or destruction, let us safely and securely destroy your hard drives, solid state drives, and smart devices with our simple Ship-n-Destroy process. Quick, easy and affordable in our NAID-certified facility. Learn more at <a href=\"https:\/\/shipndestroy.com\">https:\/\/shipndestroy.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You know you need to take care of that outdated drive, but is it worth the hassle? The fundamentals of compliant data destruction include the actual data destruction, verification of the data destruction and documentation of these two processes.\u00a0 This is time-consuming. Each step is vital to complying with all major data-compliance requirements Destruction of &hellip; <a href=\"https:\/\/www.shipndestroy.com\/blog\/wipe-or-destroy\/\">More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-184","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/posts\/184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/comments?post=184"}],"version-history":[{"count":1,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/posts\/184\/revisions"}],"predecessor-version":[{"id":185,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/posts\/184\/revisions\/185"}],"wp:attachment":[{"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/media?parent=184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/categories?post=184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.shipndestroy.com\/blog\/wp-json\/wp\/v2\/tags?post=184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}