What are safe methods or tools for wiping data off a laptop SSD hard drive? The Security Department has recommended a dedicated solution such as Blancoo, but it is more extensive. The IT department has advised using native Windows 10 features, which are free.  Therefore, I'd like to know your thoughts on the best course of action.

1.6k views1 Upvote3 Comments

Senior Information Security Manager in Software, 501 - 1,000 employees
When it comes to SSDs, degaussing is not effective on SSD media.  And software overwrite is not foolproof.

Physical destruction remains the only fail-safe method to date, but in order to be effective, even shredding and crushing require a different approach than for standard hard drives.

And ensure the device you are using for that meets the requirements of NSA/CSS evaluated products list for solid-state disintegrators. Which just happened to be updated.


Head of Cyber Security in Manufacturing, 501 - 1,000 employees
Good questions, it really depend in what kind of industry you work and what data you have.

As a first and easy mitigation measure no matter if its a notebook/tablet/smartphone or a Storage in your basement , try to get encryption up and running this will as a first step kill edge cases where procedures of physical destruction/erasing were not followed at 100% (yes you can bruteforce, and we have currently TPM Issues but its way better than having nothing).

For the rest see the referenced NSA pdf by @ben Rothke
Director of IT in Software, 11 - 50 employees
We used to use Blancco software but the renewal for it was insanely expensive.

After testing a few solutions we went with YouWipe (youwipe.com). It is far more cost effective (with a simpler pricing model) and in my own testing is quicker than Blancco to deploy, use and wipe drives (HDD and SSD).

Would definitely recommend contacting them and getting a trial.

Content you might like

Patch management: to reduce attack surface and avoid system misconfigurations39%

Malware and ransomware prevention: to protect endpoints from social engineering attacks58%

Malware and fileless malware detection and response: to protect against malicious software49%

Threat Hunting: to detect unknown threats that are acting or dormant in your environment and have bypassed the security controls32%

Not planning to change endpoint security strategy10%



Insider threats – rogue admins19%

Encrypting my data51%

Deleting my backup copies11%

Resident malware8%

Data theft – data exfiltration11%



1.6k views1 Comment

Senior VP & CISO, 1,001 - 5,000 employees
yes - no personal email (ex. gmail), collaboration sites (google doc, for instance), and social media except where we have a presence (LI, Twitter...), 
Read More Comments
4.6k views9 Comments