Category Archives: Guest Post

data privacy

Guest post: how to protect your personal data when disposing of computers

Cassie Phillips is an internet security enthusiast and blog fan who specialises in cybersecurity and technology and writes at

Most people wouldn’t get rid of their credit cards, Social Security cards or even sensitive paper documents by throwing them out or tossing them in the trash. Yet careful souls across the globe continue to fill landfills with millions of old computers containing exactly that kind of sensitive information, in the process exposing themselves to aggressive high-tech criminals.

Latest statistics indicate that computers are being mined by the millions for bank statements, business documents, Social Security numbers, scandalous pictures and information, credit card details and numerous other tidbits that open the door for everything from full-on identity theft to credit card fraud and even blackmail.

No one needs to be a victim. Here is how you can protect your personal data when you are scrapping or passing your computer or computer related technology, such as external hard drive or USB stick, along to someone else.

Back up your data

Begin the process by copying all of the important data you will need in the future somewhere safe. This can be on your new computer or storage device. Be sure that the storage device is capable of storing all of the data that you need to back up. You may also opt to back up your data in the cloud. Cloud backup strategy involves sending a copy of your data over a public network to an off-site server.

In addition, try to be as safe as possible if you are transferring or emailing them to an online backup, such as cloud storage, especially if you are doing so on the go or in a public setting.

Permanently erase your data

Simply moving your files into the trash or recycle bin and emptying it isn’t enough to permanently delete them. In fact, when you place files in the recycle bin, you are simply marking them to be written over. And unless they are written over, the files remain on the computer’s hard drive. That means anyone who gets hold of your computer can retrieve them using advanced techniques such as hard disk forensic analysis.

For ultimate safety, you need to wipe your drive with a dedicated file deletion software or program, or physically destroy the hard drive to render it useless. Programs such as WipeDrive V5, Nova Drive Erase Pro, CCleaner or Darik’s Boot and Nuke—a DBAN—will overwrite all sectors on your hard drive making data unrecoverable.

Please note that destroying the hard drive isn’t simply throwing it away—it needs to be literally broken up. Hammering or axing the drive should do the job (with much more fun), but if you are unsure of how you’ll dump the metal and plastic pieces in an environmentally-friendly manner, seeking the services of a disposal facility or a computer security firm that uses industrial-size shredders to grind the drive to nothing, might be a good idea.

Encrypt your files

Setting up encryption on your hard drive can also help to protect your data while disposing of your computer. Encryption secures all your files, including both current files and deleted files. PC owners can encrypt with the BitLocker feature built into Professional versions of Windows or opt for the TrueCrypt that is compatible with all versions of Windows.

Encrypted files require an encryption passphrase to open or be accessed. And because the passphrase will be saved to your hard drive in encrypted form and only available when you sign on, the key won’t work if you are signed out or if the screen lock is on.

Try to self-recover your erased files

One way you can be sure that your drive was properly wiped out is by using a file-recovery program to test whether or not you can recover any erased files from your drive. A file recovery program will scan external or internal hard drives for erased files, display information about them, and allow users to recover them.

If your drives were thoroughly wiped, the recovery program should find no files you can recover. File recovery software was designed to execute the same sort of trick an attacker would employ to retrieve your data.


It is completely important to wipe out all the private and confidential data present on your drive such as Social Security numbers, credit card numbers and even pictures before disposing of your computer or PC. It’s is the only way you will be protected from attackers looking to prey on you.

Cassie Phillips is an internet security enthusiast and blog fan who specialises in cybersecurity and technology and writes at

Guest Post: Social Media Forever Changes The Way We Explore History

Social media forever changes how we explore history.  That statement, while innocent enough, has profound implications for future generations.

I grew up learning history from textbooks and memorizing the exploits of explorers like Christopher ColumbusVasco Nunez de Balboa and Amerigo Vespucci who I remember writing a paper on. I know that today history is taught with a lot more attention to the every day people who lived rather than the famous ones but we still have so little information on the lives of the masses.  The everyday lives of most people is lost to us.  We see often see their lives through the eyes of those who wrote about them, not in their own words. Social media has changed forever the way we will record and learn history.

With the ability to record, photograph and video our daily lives, social media has given future generations a window into the everyday lives, thoughts and feelings of those that will come before them, “us”. Think of the wealth of information on social media platforms such as Twitter, Facebook, Instagram, LinkedIn, Pinterest and others.  For many people these social media sites provide a platform from which to explore their feelings, relationships, beliefs, opinions and the simple nuances of their everyday lives. Future generations will know what we thought about everything simply by having access to social media platforms.

Think of the ability for a family to pass on this type of personal information to future generations.  It will seem as if you were actually listening to your great great grandmother when you didn’t have the opportunity to know her at all. To me this wealth of historical information is an invaluable role that social media will play over the coming decades.  Technology has made it possible to know the everyday lives of generations so that history does not depend on those in power to tell the story.  Nor will history books be able to gloss over events that are “unpopular” or show a negative slant on things.  With everyone a journalist, photographer and videographer, the voices and pictures of the past will speak for themselves.

I did an oral history project many years ago for college and I remember talking to a 90 year old woman about her life in Manchester, Connecticut.  I recorded our meetings and then compiled a paper which fascinated me because of its personal richness.  It was the ancient art of history through storytelling that could now be kept on tape.  How far we have come even in the last 20 years with technology and the emergence of social media.

A platform such as which allows us to save our social media content provides everyone with the opportunity to pass on a living diary of their life to their family members.  How incredibly powerful the access and control of this personal information will be not only to those using it in their time but to the vast accumulation of personal historical knowledge.

About the Author

PETS picture (3)Debbie Harris is the President of Performance Intermedia, LLC a social media consulting company.  Debbie works with businesses both for profit and not for profit to ensure they are getting the most out of social media and understand best practices.  She has a Master’s Degree in Social Media Compliance and the Law. Performance Intermedia, LLC provides social media strategy, graphic design, training, effective social advertising and posting for their clients. Debbie is a very active Rotarian both on the Club and District level. She sits on the Advisory Board for a local high school.  She has just completed an e-book on 7 Strategic Techniques for Gaining Clients from LinkedIn and writes for several publications.  Debbie does workshops and seminars related to social media and its effective use.  Debbie can be reached at