Page 208 - Cyber Defense eMagazine September 2025
P. 208

internet; it’s someone you already let in the front door. These threats are surprisingly common – in fact,
            a 2024 survey found that 83% of organizations experienced at least one insider attack in the past year.
            Why so many? Because insiders have a distinct advantage, they know the systems, the people, and the
            weak spots, making their malicious moves hard to spot.


            In most cases, someone on the inside either hands over or left behind sensitive info. In addition, because
            traditional security often focuses on external foes, insiders can slip right past standard defenses. It’s a
            wake-up call: to protect data, companies must guard against threats coming from within, not just outside.



            The Illusion of Deletion

            For many, the “Delete” key feels like a data-stomping out command. However, in reality, file deletion on
            computers is mostly cosmetic. When you delete a file (and even empty the Recycle Bin), the operating
            system merely marks that disk space as “free”. It removes the file’s entry in the directory. The actual bits
            of your file remain on the disk until something new overwrites them. Security experts put it bluntly, “simply
            dragging [files] to the trash bin isn’t enough” because the data stays put until overwritten. As one Windows
            insider forum contributor explained, deleting a file “makes it invisible and inaccessible through normal
            means,” but “the actual data remains on the disk until it’s overwritten by new data.”

            In  practice,  this  means  deleted  files  can  be  recovered.  Specialized  recovery  tools  or  even  forensic
            services can reconstruct your “gone” file from the non-overwritten sectors. Even something as simple as
            a leftover spreadsheet or photo can be brought back with a quick scan. The idea that deletion equals
            destruction is a dangerous myth.



            Secure File Erasure as a Defense Strategy

            Secure file erasure—also known as data shredding or sanitization—serves as a reliable solution to the
            false  sense  of  security  that  comes  with  simply  deleting  files.  Rather  than  merely  relocating  data  to
            unallocated  space,  secure  file  erasers  overwrite  the  original  information,  often  multiple  times,  using
            specific patterns to ensure it cannot be recovered. Good erasure tools follow rigorous standards. For
            instance, some methods overwrite data 3 to 7 times with layers of random bits (finishing with a pass of
            zeros) to thwart any remaining trace.

            Secure erasure complements other security measures. It sits at the very end of the data lifecycle: after
            you’ve  transferred  or  backed  up  what  you  need,  you  run  the  eraser  so  nothing  legible  remains.
            Sometimes this involves built-in commands (like Windows’ cipher /w or diskpart clean) or bootable wipes
            like DBAN. For SSDs, you might use hardware-level secure erase or encrypt-then-throw-away-keys,
            since wear leveling complicates ordinary overwrites. After erasure, if an insider (current or former) tries
            to grab data from a retired disk or hidden folder, there’s nothing readable there. In effect, secure wiping
            turns potential leaks into dead ends. Data thieves simply won’t find files to recover.

            Secure  erasure  also  helps  with  compliance.  Regulations  like  GDPR,  HIPAA,  or  CCPA  require
            organizations to securely delete personal data and sometimes to prove that deletion.





            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          208
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   203   204   205   206   207   208   209   210   211   212   213