Cybersecurity researchers said that an approved DoD wipe software can now be used to do a total drive data wipeout in case of maintenance or expansion of a big data centers; or even in the case of a serious data breach.
We must say that this is not a malicious tool, in fact like we said before it has been approved by the U.S. Department of Defense for sanitization of magnetic, SSD and hybrid storage devices.
As Storage Area Networks (SANs) become more common in corporate environments for expanding data storage capacity. By using this new tool company users have more advantages when they are trying to remotely wipe SAN devices and EFI computers.
It also improves support for hardware from NVMe SSD wiping in modern laptops to large-capacity HDD wiping in server systems including support for Sparc and Itanium architecture.
For those who don’t know EFI (Extensible Firmware Interface) booting is a de-facto standard for most computers manufactured in the past 5 years.
Remember everything can be hacked. In order to stay away from any threats related to the cyber world, we recommend the install of antivirus for Windows or antivirus for Mac on every device that you own, depending on which OS your device is running. If you are a company, it is also recommended to hire every year a specialized cybersecurity company that will run annual tests on your company’s network. These tests include penetration testing and ethical hacking tests;
This new and improved features of remotely wiping SAN storage happens without the need to physically access or disassemble the devices, which instantly adds a valuable convenience and efficiency factor for anyone who wants to wipe multiple devices simultaneously. The wiping software UI has been redesigned to make the process even simpler and faster, featuring pre-set recommended settings to securely erase SSD, USB and HDD devices. Admins can view, filter and export wiping history to keep track of every operation performed on any device. The hard drive wiping reports are now customizable for documenting only the most important information. Also, users can create, save and print wiping reports in one of 5 popular formats as a certificate of proof for auditing.
Experts say that such tools are a blessing because new standards, protocols, and technologies are emerging every month and technology needs to be updated fast in order to obtain full compatibility with recent innovations.
We would continue to monitor this cybersecurity problem. Meanwhile, users should keep a keen eye out for any cyber attacks. Remember to use an antivirus for Windows or antivirus for Mac in every device that you own, depending on which OS your machine is running, If you are a company we recommend to hire every year a specialized cybersecurity company that will run annual tests on your company’s network, tests like this include: penetration testing and ethical hacking.