Watch this video on YouTube
As a cloud security engineer, which practice would be considered insufficient for the purpose of securely eradicating data within a cloud environment?