Yes, it should be enough
The software you mentioned implements the 3-pass DoE method, which is covered by the answer provided in AndrolGenhald's link.
Recovering data from wiped drives is an old vulnerability which doesn't seem to be exploitable anymore. At least not by your common attacker. Thus a, 3, 7, or 35-pass wipe doesn't really matter.
Note that I'm assuming that you're using modern hard drives and that your threat model is composed of burglars, people looking in dumpsters, etc. Against governmental agencies, I would recommend to start from new hard drives using common encryption method, while physically destroying the old hard drives. However, they would probably look for easier attack vectors first.
When pondering the security of your data, one of the first steps is always to define your threat model. This threat model (partially) depends on the sensitivity of the data you want to protect. Are you a student that doesn't want their roommate to snoop on their laptop? A password should be good. Are you a spy with highly confidential data? Perhaps, then, you'd need to go a step further.
PS: If you have SSDs, I think the erasing process may be trickier. (Could someone confirm?) As a safety precaution I would, once again, recommend you to start from scratch with brand-new hard drives and a use encryption.