What Actually Happens to Deleted Data?

What Actually Happens to Deleted Data?

Chances are, you’ve gone through some old files and weeded through them, deleting what is no longer needed. This is especially important when you are upgrading your storage and getting rid of your existing storage media or an old computer. Let’s talk about what really happens when you’re doing so—chances are, you may be overlooking a serious security issue.

How is Data Deleted?

The answer to this question heavily depends on the hardware that the data in question is stored on. Storage media comes in two types: hard disk drives (HDDs), or solid state drives (SSDs). These two options function through vastly different methods:

  • HDDs are mechanical devices that feature a spinning platter upon which a mechanical arm writes and overwrites data.
  • SSDs save data via flash memory to chips, where it can be read very quickly, which also eliminates the need for any moving parts.

This single difference is the source of many others that often make one storage device the better option over the other. However, we’re here to talk about removing data from these devices, not adding to it… but as it turns out, this isn’t such a straightforward process where SSDs are concerned.

Not All Data is Deleted the Same Way

HDDs Have a Relatively Simple Process

If you’re using a hard disk drive, deleting data is relatively simple. The arm is positioned over the disk in the appropriate spot and marks the data written there as “to be overwritten.” 

Like we said, simple.

SSDs are a Little More Complicated

Because SSDs use flash data, they can’t just be overwritten. The existing data on the cell needs to be erased before any data can be added back—but this takes valuable time and could slow things down.

This is why SATA-capable SSDs can use TRIM.

TRIM is a command that informs the SSD which data blocks can be erased, helping extend the life of the drive and making the entire process more efficient. SSDs have an internal operation called garbage collection where valid data is moved from a block that contains data to be deleted. TRIM adds to this process by preventing discarded or otherwise invalidated data from being copied, allowing the SSD to ignore certain data points during garbage collection and thereby reducing the number of write cycles the SSD will be subject to.

This all happens in the background, too, so you can keep working with the confidence that you’ll have the storage space you’ll need. 

If you’re using Windows, TRIM is enabled by default, replacing Disk Defragmenter.

Can You Trust that Your Data is Really Gone?

Unfortunately, the answer can be more challenging than you’d expect. 

In an attempt to preserve the longevity of the SSD, the SSD will fib to the OS a little bit in terms of which data blocks are available so that the different cells age at the same rate. This is called wear-leveling, and makes it totally plausible that certain blocks weren’t really trimmed through TRIM, simply because the SSD is trying to preserve itself. In addition, TRIM involves some buffer space, which could very well contain recent data as well.

So, You Can Sometimes Be Somewhat Confident that Your Data is Deleted (but Not Really)

Don’t get us wrong, your files will generally be deleted. However, you can only be so sure about that—and don’t get us started on security. This is all critical to keep in mind when you’re planning to dispose of a device, particularly when you plan to donate it or resell it.

Lean On Us for Assistance with Your Hardware Refreshes

While upgrading your business’ technology is a great way to ensure it remains reliable, any good your improvements do will be undone if the technology you’ve replaced winds up causing a data breach.

While we can completely wipe a hard drive on your behalf, it may just be more practical to take more extreme measures. Since a new hard drive is relatively affordable and a used drive won’t realistically last very long, we often recommend destroying the drive beyond any hope of data retrieval—and this goes double for drives that contain sensitive data.

Give us a call at 603-889-0800 to learn more.

Related Posts

Mobile devices have become a key part of our daily lives, to the point that many of us openly feel undressed without our phones. As a result, our phones go everywhere with us. However, it’s important to remember that some applications have requested ...
We’ve been known to take a bit of an extreme approach to cybersecurity—your business is at constant threat of being attacked by all manners of threats and all that. While we stand by this approach as an effective way to boost awareness and adherence ...
Have you ever wondered how some platforms will only have you log in once for all of your various needs, even though they might be different applications, websites, or services? This is essentially what single sign-on is, and it’s quite common in the ...
It’s almost summer, which means baseball is in full swing. The game that many of us grew up on has recently gone through a major shift; one that small business owners can replicate to help their organizations. It came about through the use of data an...
While we—for reasons that should be obvious—tend to focus our attention on preventing and avoiding cybersecurity breaches, it is important that we address how your business responds to a successful breach attempt. Let’s go over how to create a data b...
Data breaches—any event where a business’ confidential data is viewed, copied, or stolen by an unauthorized person or party—are a serious problem. Unfortunately, they are also a serious problem that can be caused by no shortage of situations. Let’s r...
Tomorrow, March 31st, is the official World Backup Day, a day intended to remind us all of the importance of taking backups for the sake of data continuity. While this kind of day can be a valuable reminder of a critical best practice, we contend tha...
The cloud is far and away one of the most beneficial technologies that a modern business has at its disposal. Unfortunately, the same can be said for modern cybercriminals. The cloud has given cybercriminals new opportunities that are important to ac...
Healthcare is an industry that—quite understandably—operates under very high pressure for a significant share of the time. As a result, it is only natural to conclude that a technology that could potentially make the lives of healthcare providers and...
When we talk about data privacy in a business, the default is to generally think about the data the business has collected and compiled from its clientele. However, that’s just one type of data a business has. There’s also a lot of data that is colle...
Look, we are big fans of the cloud, especially for data storage, but you shouldn’t implement the cloud without a solid security strategy. Whether you are using it for your business’ data storage needs or just to take backups of your infrastructure, y...
Cybersecurity is an important subject for a business’ entire team to appreciate, particularly when it comes to the minute differences between different terms. For instance, a layperson might hear “breach” and automatically think “security incident.” ...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our offices in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.


Onsite Computer Support Services are available to businesses within 60 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

White Mountain IT Services


33 Main St, Suite 302
Nashua, NH 03064


121 Riverfront Drive
Manchester, NH 03102


Client Help Desk


Open Positions