Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management

    Secure Your Shredding

    By
    Ben Rothke
    -
    June 21, 2005
    Share
    Facebook
    Twitter
    Linkedin

      For years, companies have been routinely shredding physical documents to ensure that confidential and sensitive information doesnt fall into the hands of competitors. This practice is partly due to the ease at which Dumpster diving can be carried out.

      Indeed, companies believed they were doing their due diligence when they created policies that stated, for example, “any paper containing personal information such as, but not limited to, name, Social Security number, address, phone number, and/or other personal medical or financial information, prior to disposal, must be shredded to protect the privacy of the persons involved.”

      They had a policy. They had a shredder. Problem solved. But not for long. New technologies are making it increasingly easy to reconstruct virtually any document, and if you are worried about the security of sensitive material, you should know a little bit about document shredding and document reconstruction.

      /zimages/3/28571.gifClick here to read about how lawmakers are working to prevent identity theft.

      Shredders themselves come in two basic varieties, strip-cut and crosscut. A strip-cut shredder cuts the paper into strips ranging from a quarter-inch to a half-inch wide. Strip-cut machines are more popular because they are usually less expensive, tend to be quite durable and generally shred faster than crosscut models.

      Rather than cutting paper into strips, crosscut shredders reduce it to smaller particles—resembling rectangular confetti and measuring approximately one-quarter inch by 1.5 inches—and provide much more security than strip-cut machines. Putting the document back together would essentially be the same as reassembling a giant jigsaw puzzle whose pieces have little color.

      In addition, because of the smaller cuts, bags of crosscut shredded material occupy less space than those containing strip-cut remnants. With crosscut shredders, documents are cut in two directions, producing very small particles. Because the particles are so small, they are self-compacting, reducing overall bulk.

      Most people outside the military and intelligence communities have probably given little thought to the idea that shredded documents can somehow be put back together. The reality is that, with enough time and resources, nearly any paper document can be reconstructed, assuming it was not shredded properly.

      Cody Ford, president and CEO of Houston-based ChurchStreet Technology Inc., had observed the Enron Corp. financial meltdown when he was working at Enron as an IT consultant. Ford noted the importance of reconstructing shredded documents during the investigation of Enron. In early 2002, he started ChurchStreet.

      ChurchStreets proprietary Strip-Shred Reconstruction and Cross-Shred Reconstruction suites enable companies to have their shredded documents reconstructed. With the exception of work done for government intelligence agencies, all client document reconstruction is done on ChurchStreet premises with ChurchStreets equipment.

      “The primary reasons for a reconstruction by our clients is to reveal information that was discovered during litigation,” Ford said. “Once one party realizes there are shredded documents involved, they usually want those reconstructed, since they assume the other party is hiding something.”

      The process basically works this way: Once ChurchStreet technicians receive document shreds from a client, they determine whether the original document can be salvaged. Then they feed the strips into a scanner. The scanner reads each strip, which is given a unique identification number so that it can be matched to a page. At that point, the ChurchStreet software takes over and performs reconstruction.

      The proprietary software does the bulk of the reconstruction work. From a matching perspective, many documents have unique headers and footers, which help the software match related pieces. Other types of documents, such as e-mail, fax cover sheets and memos, have similar formats. In addition, as a general rule, approximately 30 percent of strips are not processed, or matched, as they are blank.

      Ford said that success in document reconstruction ultimately depends on three primary factors: the type of documents that were shredded (for example, forms, spreadsheets, graphics or basic documents); the condition of the shreds; and an undisturbed remnants bag, which keeps shreds from the same document together. With a crosscut reconstruction, it is much more important that the collection bag be as undisturbed as possible, given the amount of shredded data.

      The innocuous shredding practices of the past are no longer acceptable. When it comes to shredding, the technology developed by ChurchStreet demonstrates that security policy must change and adapt to new threats. Companies that blindly shredded documents in the past must now take a much more formal—and thoughtful—approach to what they want to shred and how they want to shred it. In 2005, nothing is simple in security, especially shredding a piece of paper.

      Ben Rothke, CISSP, is a security consultant with ThruPoint Inc., based in New York, and the author of “Computer Security: 20 Things Every Employee Should Know.” He can be reached at brothke@thrupoint.net.

      /zimages/3/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Ben Rothke
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×