Lernzentrum

Bereit, in die Welt der Datenlöschung einzutauchen, über die neuesten Branchennachrichten auf dem Laufenden zu bleiben und wertvolle Einblicke zu gewinnen? Suchen Sie nicht weiter, denn wir haben alles, was Sie brauchen!

GDPR data deletion

GDPR Compliance and Global Data Erasure Laws

In this edition of The Standards Behind Certus, we take a closer look at GDPR compliance and how data erasure laws worldwide are evolving. What started as a European regulation has become the foundation for global data protection, especially when it comes to GDPR data erasure and secure data disposal.

Scherm­afbeelding 2026 04 09 om 12.29.42

SSD Shortage Is Rising: Why You Should Securely Erase SSD Drives Now

The way businesses think about storage is changing. With an ongoing SSD shortage and rising prices, simply buying new drives is no longer the solution. Organizations are under pressure to do more with what they already have. But reusing storage isn’t just a technical decision; it’s a security challenge. That’s where secure data erasure becomes more important.

Schermafbeelding 2026 04 02 om 10.53.11

Myth vs Reality: Data Erasure Edition

Most organizations don’t think about their data erasure process until something happens. An audit, security incident, or compliance check can quickly show the difference between what you expect and what you can actually prove. Let’s look at some common myths about data erasure and how they can lead to mistakes.

How to Explain Data Erasure to Your CFO

Explain Data Erasure to Your CFO: Risk, Cost & Compliance

Many people think of data erasure as just another technical step when retiring IT equipment. Devices are taken out of service, processed, and the data is removed. However, this is actually when the real business risk starts. When devices leave your organization, the data on them can still be valuable and risky if not properly erased.

Outsourcing Data Erasure Discover Certus Authorized partners

Outsourcing Data Erasure? Choose Expertise You Can Trust

Outsourcing data erasure is a smart, efficient way to meet your data security needs. If your team is short on time, managing many devices, or looking for expert support, letting professionals handle the process can make things much easier for your organization. However, choosing to outsource your data erasure means you need a partner you can truly rely on. Not all providers offer the same level of security or expertise.

Why HIPAA Compliance Matters for Secure Data Erasure

Why HIPAA Compliance Matters for Secure Data Erasure

In this edition of The Standards Behind Certus, we’re taking a closer look at HIPAA, one of the most recognized data protection regulations in healthcare. We’ll explain what HIPAA is, why secure data disposal matters, and how Certus can help your organization stay compliant when managing healthcare data.

Scherm­afbeelding 2026 02 26 om 14.50.55

Audit-Ready IT Asset Disposal: What Regulators Expect

IT asset disposal is no longer only an IT task. In audits, the question is no longer whether devices were wiped, but whether you can prove it. Regulators everywhere are raising the bar for data protection and accountability. Whether you are dealing with GDPR, U.S. privacy laws, or industry-specific rules, your organization is expected to keep control of sensitive data, even after devices are retired or recycled. Your responsibility continues, even after the equipment leaves your building.

European Commission Cyber Incident Why Deleted Data Is Not Erased

When Mobile Endpoints Become a Security Risk

Recent reports have shown that the European Commission faced a cyber incident involving mobile devices. While details are still emerging, this highlights an important reality: smartphones and tablets are now essential access points in any IT environment. As these devices handle more sensitive data, it's crucial to manage them with the same care as any other endpoint.

Scherm­afbeelding 2026 02 12 om 15.01.04

Data Erasure as a Board-Level and Liability Risk

Many organizations still see data erasure as just an IT task, handled when devices are retired. However, this view is quickly becoming risky and outdated. Today, data erasure is a board-level risk with real legal, financial, and reputational impact. If data is not properly erased, responsibility extends beyond IT and can reach your executive team and board members.

Scherm­afbeelding 2026 02 05 om 15.04.22

Why Data Erasure Must Be a Top Priority in M&A, Reorganizations & Exits

Mergers, acquisitions, divestitures, and corporate exits require complex strategic planning, including deal pricing, legal structures, and financial forecasting. However, data risk management, especially data erasure, is often overlooked. During corporate transitions, improper handling of data can create significant compliance risks, security exposure, and long-term liabilities that directly impact the success of the transaction.

Scherm­afbeelding 2026 01 29 om 14.50.20

Data Erasure With and Without Internet Access: When to Use Each

Secure data erasure is not just about deleting data; it also involves how, where, and under what conditions that data is erased. For organizations managing sensitive IT assets in various environments, it's crucial to understand the difference between data erasure with or without internet. This knowledge is essential for maintaining security compliance and ensuring operational efficiency.

Scherm­afbeelding 2026 01 22 om 14.53.59

The Role of Reporting in Secure Data Erasure

Data erasure no longer ends when a device is wiped. For organizations operating in highly regulated environments, proof has become just as important as the erasure itself. Regulators, auditors, customers, and partners increasingly require clear evidence that data has been permanently erased in line with recognized standards.

Scherm­afbeelding 2026 01 15 om 14.54.58

The EU Cyber Resilience Act and Why Data Erasure Becomes Non-Negotiable in 2026

The EU Cyber Resilience Act alters how organizations handle digital product security throughout their lifecycle. Though effective from December 2024, its impact peaks in 2026, especially for those involved in IT asset reuse and decommissioning. At that stage, expectations will shift from policy preparation to demonstrable risk reduction, highlighting the importance of effective data erasure.

Scherm­afbeelding 2026 01 08 om 15.36.17

Certus Introduces Diagnostics for Computers and Mobile Devices

Secure data erasure is essential, but understanding the actual condition of a device is just as critical. That’s why we’re proud to introduce Diagnostics as a new feature within our software for both computers and mobile devices. With our Diagnostics feature, organizations can assess, document, and report on the functional condition of devices before reuse, resale, or recycling, all within the same trusted Certus environment.

CC Blog Post Certus Erasure 1 (2) (1)

Certus and Circular Computing Partner to Enable Secure, Scalable Circular IT

At Certus, we believe data erasure is a fundamental enabler of circular IT. Without absolute certainty that sensitive data is permanently removed, large-scale reuse of IT equipment simply isn’t possible. That’s why we’re proud to partner with Circular Computing. Together, we share a clear mission: enabling secure, compliant, and responsible IT reuse at scale, while reducing e-waste and the environmental impact of technology.

What is the GDPR

Why GDPR Makes Certified Data Erasure Essential

In this edition of The Standards Behind Certus, we take a closer look at one of the most important regulations shaping how organizations manage personal data: the General Data Protection Regulation (GDPR). This blog explains what the GDPR is, how Certus supports GDPR-aligned data erasure, and what this means for your organization.

Scherm­afbeelding 2025 11 26 om 17.28.21

Why Q4 Is the Perfect Time to Implement Data Erasure in Your Business

Q4 is always a unique moment in the business calendar. Budgets are being finalised, compliance checks are intensifying, and IT teams are pushing to close the year with a clean slate. Yet one critical area still gets postponed far too often: data erasure. If your organisation handles laptops, servers, mobile devices, or storage systems, Q4 isn’t a time to delay; it’s the time to act. Here’s why data erasure deserves a place on your end-of-year priority list:

Your Decommissioned Hardware is the New Target: How Certified Data Erasure Secures Your Supply Chain

Your Decommissioned Hardware is the New Target: How Certified Data Erasure Secures Your Supply Chain

At Certus, we see an alarming trend: while companies invest millions in cybersecurity, the most vulnerable link is often overlooked, the data on equipment leaving their premises. The hard drives and servers exiting your data center are a prime target for cybercriminals. In 2025, supply chain attacks are specifically targeting end-of-life IT assets. Here's how certified data erasure provides your ultimate defense.

Schermafbeelding 2025 10 31 om 17.50.16

Simplifying Data Erasure Through Seamless Integration

IT environments are becoming more complex by the day, automation and integration are no longer a luxury, they’re a necessity. Organizations need solutions that fit effortlessly into their existing infrastructure, not tools that require them to rebuild their processes from scratch. That’s why one of the most powerful trends shaping the data erasure industry today is the move toward API-driven, automated workflows

Google’s Encryption Shift vs. Certified Data Erasure

Google’s Encryption Shift vs. Certified Data Erasure

Earlier this month, Google announced a shift from traditional disk erasure to encryption-based media sanitization, a process that destroys encryption keys to make data inaccessible. While this marks progress in data protection, it also highlights an important distinction: “Encryption hides data. Certified data erasure removes it, permanently.”

The Importance of IEEE Standards in Certified Data Erasure

The Importance of IEEE Standards in Certified Data Erasure

International standards are the foundation of secure and verifiable data erasure. In our series The Standards Behind Certus, we explore the frameworks that shape the way organizations protect sensitive information. This time, we focus on the IEEE standards and their role in data sanitization.

1
23