"Does Your Cyber Hygiene Need a Brush Up?"

27 Feb 2013 | Michael Waksman

When you work with sensitive data, no matter what field you're in, regular cyber security checks are a must. Practicing routine 'cyber hygiene' will help protect against spillage or loss of your sensitive data. If you're wondering what 'cyber hygiene' means, a great way to understand it could be to compare 'cyber hygiene' with something more familiar, such as dental hygiene.

The idea is simple... For good dental hygiene, we trust the American Dental Association for proper guidance. For good ‘cyber hygiene’, we have the National Cyber Security Alliance. When we visit the dentist, we're told that we should brush our teeth twice a day to keep our teeth clean and healthy. However, to really protect our teeth and gums, we are also advised to floss our teeth regularly and to use mouthwash.

So what does that have to do with data on a computer? Well think of it like this: When we delete files, it's like brushing our teeth. On the surface, it may appear that we've cleaned everything up, but look a little closer and there are still bits and pieces remaining that only flossing (wiping of data) will really get rid of. In 'cyber hygiene' terms, using a high quality data wiping tool is like flossing our teeth. It gets rid of all data remanence - and it's the only way to go if you want to truly protect your sensitive data from unwanted eyes.

If you don't routinely wipe data on your computer, then when you create files, work with them, or delete them, parts of those files accumulate as data remanence. To be absolutely sure that you've removed all data remanence, you need to take extra steps. Using a powerful data wiping utility can ensure that you've removed all the sensitive data to the point where it can no longer be recovered. By doing so, you can be confident that you've successfully protected that data. In order to guarantee a clean computer and permanently delete all traces of old or used files, there are several important steps that we should all be taking:

#1 - Use the Right Tools for the Job

Using dental floss is a must to keep your teeth squeaky clean - and a good quality data wiping utility is essential to make sure that all sensitive data is erased:

  • Keep your data wiping software up to date. Up to the minute software gives you greater protection against new threats. Whenever you introduce new software, add on hardware, update or modify system files, install new applications or change operating systems, you risk spillage of data. Keeping your software up to date can significantly minimize that risk.
  • Get a comprehensive set of wiping tools. Data wiping software can vary from one provider to the next. To maximize security, you need a program that delivers a complete set of tools with the power to effectively carry out a thorough system clean-up.

Getting back to this hygiene idea, a powerful data wiping utility with enhanced tools is like using dental floss and mouthwash alongside your toothbrush and toothpaste. While using just some of these things will cover the basics, the extra tools will be that much more effective. When removing data from your computer, wiping software can be used in conjunction with encryption software to more thoroughly protect your data. With encryption, you can completely protect your swap file. Windows-based systems use a swap file for virtual memory support - helping to manage system memory while you're working at your laptop or PC. While working on your files, Windows will take files or documents (even those that have been encrypted) and copy all or part of them to an open unencrypted 'swap. ‘ Encrypting the swap file will preserve the integrity of data, further preventing any unauthorized access to private information.

#2 - Perform Wiping Tasks Properly

When you visit a dental hygienist, you'll get tips on how to brush your teeth properly... "Use short strokes, back-and-forth and up-and-down"... "Pay attention to your gum line"... "Clean the inner and outer surfaces of your teeth"... and so on. Much like these tips on dental hygiene, here are some ‘cyber hygiene’ steps to make sure you cover all bases and completely wipe your data for a clean system (NOTE: Don’t worry if this sounds too complicated – take comfort that with a good wiping utility, all this dirty work is managed with a simple click or checking a box.):

  • Encrypt and protect your system swap file before wiping.
  • Disable System Restore before wiping to avoid shadow copies.
  • Empty your Recycle Bin before wiping to make sure everything is cleared out.
  • Wipe any free space areas where deleted data is stored until overwritten by new information.
  1. Choose an appropriate wiping scheme so that you know exactly how many times the disk will be overwritten and which wiping patterns will be used.
  2. Wipe slack space of existing files. Cleaning these slack spaces is just like flossing your teeth. Old data can be stored here, but an effective wiping utility should clean these areas for maximum ‘cyber hygiene’.
  3. Wipe MFT records to wipe names of deleted files.
  4. Clear the user Temp folders routinely to make sure that names of recently used files are cleared and any traces of Internet activity (Internet History and Local History) are removed from the system.
  • Check the results. Just like you would take a final look at your teeth in the mirror, you should also check your data wiping results by examining the following:
  1. Viewers to look at disk sectors after wiping.Log
  2. Viewer reports to review the process.

#3 Establish a Routine to Improve Results

A dentist will recommend brushing your teeth twice a day to prevent tooth decay. And routine cleaning of your computer system is recommended to preserve data integrity and prevent data spillage or unauthorized access to sensitive information. For best results, you should do the following:

Wipe records of internet activity and local history. Doing so after each session before you shutdown or log off is like brushing your teeth before going to bed. It takes a little extra effort, but it can make a big difference over time.

Wipe free space. While this can be a time-consuming process, it is recommended to do so as needed. For example, wiping free space should be done after standard deletion of any sensitive data or file to clean up any residual data.

Of course, you may think all this cleaning sounds great - but you may also be wondering how on earth you'll find the time for it all! You may also be wondering if this is all really that important... If you're yet to be convinced, let's use the dental hygiene analogy and compare dental and cyber hygiene to weigh the benefits:


Oral Hygiene:
Brush & floss your teeth  

Cyber Hygiene:
Wipe data on your computer

Avoid bacteria  

Avoid data theft and 'curious people'

Avoid pain, dentist and big bills

Avoid difficult situations, 'technicians' and big expenses

Better performance: eat, speak and socialize better

Better performance: run PC securely and protect data better

Keep your teeth, gums and mouth in top condition

Keep your computer and privacy in top condition


Like dental hygiene, good 'cyber hygiene' is something that you need to carry out routinely. 

In recent years, technology and cyber security experts have created many effective and powerful tools that ensure your computer and sensitive files remain safe. Routine use of reliable wiping tools is the best way to protect you and your private information.

Practice good ‘cyber hygiene’ and keep your computer safe and clean!

This post originally appeared as part of a guest blog on StaySafeOnline.org, the website of the National Cyber Security Alliance, and is republished here with permission of NCSA.

Pure & Simple Wiping Software by Jetico

Jetico provides pure and simple data wiping software for National Security, Compliance and Personal Privacy. Trusted for over 10 years by the U.S. Department of Defense, Jetico's BCWipe can wipe selected files beyond forensic recovery such as in response to classified data spills, while BCWipe Total WipeOut can erase hard drive data entirely such as for disposal or decommission.

Michael Waksman Jetico CEO bio image
Michael Waksman

Michael Waksman has been serving as CEO of Jetico since 2011, more than doubling the size of the company during his tenure. He brings more than 20 years of communications, technology and leadership experience.

At Jetico, Waksman has lead creation of the corporate identity, raising global brand awareness, building a more commercially-driven team and initiating enterprise customer relations. Jetico has maintained a wide user base throughout the U.S. Defense community, in the global compliance market and for personal privacy.

Waksman served as vice-chairman of the Cyber Group for the Association of Finnish Defense and Aerospace Industries. Recognized as a security and privacy advocate, he is a frequent speaker at international events, occasionally on behalf of the Finnish cyber security industry. In 2012, Waksman was honored with The Security Network's Chairman's Award for fostering collaboration between the United States and Finland. As dual citizen, he is a native New Yorker and has been living in the Helsinki region for over 15 years.

View all blog posts

Thank you for contacting Jetico!
We will respond to you as soon as possible.

Send us a message - we'll reply within 24 business hours.

Need help now? Call Us
US: 202 742 2901 EU: +358 50 339 6388