WipeOut Inc.
News & Media
The FBI Is About To Get The Power To Hack Millions Of Computers
December 1, 2016
WASHINGTON - Congress had six months to debate granting President-elect Donald Trump’s FBI new legal powers to hack millions of computers, and Republican leaders objected to doing so on Wednesday.

That means that starting Thursday, a Department of Justice official will be able to go to a single judge, assert that a computer crime may involve millions of networked devices.
According to three senators who tried to put the brakes on that new authority Wednesday so Congress could at least discuss it, there are no concrete assurances from law enforcement officials that privacy won’t be violated or that devices won’t be damaged. Nor was there any explanation of how authorities will hack Americans’ wired equipment.
Media Coverage :- (Click on links below to view news)
Healthcare's Lost and Stolen Computer Epidemic
April 4, 2015
The healthcare sector was rocked in early 2015 with news of the two mega breaches Anthem and Premera Blue Cross. In these data breaches, hackers were able to carry out sophisticated cyber-attacks against their networks. This new-school method of cyber-attack is very effective, and in these two breaches alone over 90 million customer personal records were compromised. However, there is still an old-school threat that looms in the healthcare sector, the old-fashioned stolen or lost computer.
"According to a recent healthcare industry survey by Bitglass, 68 percent of healthcare security breaches were due to the loss or theft of mobile devices or files, 48 percent of data lost was on a laptop, desktop computer or mobile device, and only 23 percent of the breaches resulted from hacking not connected directly to the loss or theft of a mobile device," said Ramesh Devare, COO of RxOffice.
Media Coverage :- (Click on links below to view news)
Partners in Community Building Implements IndiSoft’s WipeOut
March 24, 2015
Counseling agency benefits from electronic data distruction
COLUMBIA, Md. - Partners in Community Building (PICB), a community-based counseling organization in Chicago, has selected IndiSoft’s electronic data wiping technology WipeOut to wipe consumer data that is no longer needed from individual computers and its new servers.
PICB, a non-profit organization that started in 2002, helps improve the lifestyle of seniors, families and individuals of low to moderate income through housing and financing assistance as well as community education. The organization, which services Chicago and its surrounding suburbs, now runs WipeOut on its server and will erase unneeded information monthly.
“Due to the sensitive nature of the information we process and store, we needed an effective and secure way to destroy files once they are no longer needed or when a computer has to be repurposed,” said Bobbi Ball, executive director of PICB. “We can assure our clientele and grantors that their information is properly safeguarded with WipeOut.”
WipeOut features a secure log of when it is accessed by users so system administrators can determine and review what is being erased, when and by whom. Authorized users can remove sensitive data that is no longer needed from the hard drive of a server, PC or laptop, which can then be donated, all while knowing no customer information remains active or accessible. WipeOut is a patented technology.
“There are many regulatory requirements for companies regarding how they need to destroy or wipe sensitive information that is no longer needed,” said Ramesh Devare, COO of IndiSoft. “With WipeOut, we offer the highest level of confidence available that information is completely wiped, giving companies as well as consumers the protection they deserve. In addition, companies using WipeOut will be in full compliance with federal and state requirements for data disposal.”
"About IndiSoft LLC"
Columbia, Md.-based IndiSoft LLC is a global company that develops collaborative technology solutions for the financial services industry. Through various portals, IndiSoft’s RxOffice® platform (patent pending) enables disparate parties to communicate and transact online in real-time. The transparent workflow technology improves the efficiency of business processes and offers audit, compliance and quality control capabilities to accelerate decision making and support business excellence. For the fourth consecutive year, IndiSoft was named to the Inc. 500|5000 listing of the fastest growing private companies in the U.S. and was selected as one of the Top 50 Service Providers by Mortgage Technology magazine in 2011, 2012 and 2013. For more information about IndiSoft visit its Web site at www.indisoft.us.
Media Coverage :- (Click on links below to view news)
Wipe Your Data Or End Up In Big Doo-Doo  October 27, 2014
News of security breaches, hacker attacks, identity and data thefts has grown at an alarming rate across all industries : financial, healthcare and insurance to name a few. Banking titan JPMorgan Chase and retailer Kmart are just a couple of the latest companies to be hit by hackers. These breaches are the catalyst for preventative measures to protect against future incidents. In addition to reviewing policies and making data security an even higher priority, all companies need to look more closely at how they can destroy data that is no longer needed while maintaining strict compliance requirements.
According to a July report from Databreachtoday.com, "The federal tally of major health data breaches has grown substantially in recent weeks to a total of 1,074 incidents affecting 33.7 million individuals since September 2009. The approximately 30 incidents added to the list over the last month provide examples of the variety of risks that healthcare entities continue to battle."
The shocking news is that most of these data breaches have been due to the theft or loss of laptop and desktop computers. This could easily have been prevented with technology that is currently available and by also taking a more security-centric business focus
Most people are probably aware that permanently removed data go into a recycle bin but are still accessible. Even after being permanently removed, data can be easily recovered using a number of software tools, so it is not safe to just permanently remove confidential, personal, financial, healthcare files and any other information. permanently removed data are merely tagged as "permanently removed" but are not actually permanently removed. This, unfortunately, exposes an organization to possible non-compliance with data wiping policies, as well as endangering the safety of personal identifiable information in cases where a computer is hacked or stolen. To manage confidentiality of the data at the disposition stage, companies need to use a tool that removes data securely with no remaining traces left behind and still protects user data.
Having a proven data-wiping tool in place eliminates the possibility of an unwanted information leak. While most of a company's systems security is managed at the network and application level, securing laptops and desktops is still a gray area, hence the need for additional security measures at that level.
When companies dispose of old computers/laptops, they often donate, sell or trash them. If the data has not been correctly wiped from the hard drives, there could be a security breach.
Fortunately, there are data-wiping applications that can eliminate breaches in both cases. For old machines, companies can completely erase the hard drive before disposal. In the case of a stolen machine that has data-wiping software, companies can notify the data-wiping software provider who can then remove data securely from the specified drives on the machine when and if it is connected to the Internet.
To improve data wiping processes, companies should do the following:
  • Review current practices of data-wiping to ensure they are compliant;
  • Remove shared access where possible;
  • Set the data/files/folders retention period for each type of data and ensure that after the retention period has ended; data should be securely removed from the devices using a data-wiping application;
  • Implement a practice to remove data securely;
  • Protect external drive access by setting passwords and removing data securely from storage devices;
  • Publish data disposition and wiping guidelines internally; and
  • Deploy a secure data-wiping tool for each user.
Companies can ensure they are compliant with state and federal data-wiping laws by following simple risk management strategies that will allow them to avoid the risk of data breaches. To be successful, those strategies must include an enterprise-wide approach to data protection and destruction. Process, people and technology can negate the power of thieves.
Ramesh Devare is chief operating officer for IndiSoft, a provider of software to the financial services industry.
IndiSoft Offers WipeOut to Financial Industry May 6, 2014
Secure data destruction tool now available to financial institutions
COLUMBIA, Md. - In a digital environment that has recently been under seize by viruses and hackers, IndiSoft's WipeOut offers the financial industry the protection of a secure data destruction application. WipeOut enables administrators with the proper credentials at banks and other financial institutions to use the tool to effectively and efficiently destroy client-sensitive data from hard drives in a secure environment. This allows them to protect consumers as well as comply with federal regulations that require banks to destroy data in a specific way. WipeOut ensures this requirement is effectively met.
Management at IndiSoft, an ISO certified organization, understands information security and WipeOut ensures securely remove unwanted data without leaving any traces.
"Financial institutions have such an important role in the lives of consumers as well as the health of the general economy that requires them to provide the peace of mind that sensitive information that is no longer needed is destroyed properly," said Keith Boyce, vice president of business development. "With WipeOut financial institutions can comply with federal regulations, protect consumers information and now have the option of recycling the hardware to the communities they serve."
WipeOut is patented technology that features a secure log of when it is accessed by users so system administrators can determine and review what is being erased, when and by whom. Users can properly remove sensitive data that is no longer needed from the hard drive of a server, PC or laptop, which then can be donated, all while knowing no customer information still remains active or accessible.
Media Coverage :- (Click on links below to view news)
Sign In
Username :
Password :
NAID Vendor

National Institute of Standards and Technology
This product ensure your organization is meeting the standard put forth in the NIST 800-88 & 800-36 Guidelines for Computer Security
Dell Technology Partner
wipeout-linkedin wipeout-facebook wipeout-twitter