DataShield Helps the Citizens of Wayne with Unwanted Electronics

Saturday, September 24th marked the annual City of Wayne Green Team electronics recycling event with service provided by DataShield. For the fifth year in a row community members drove through and dropped off unwanted electronics. This event and others like it are aimed at keeping e-waste out of landfills through proper disposal. Using a firm like DataShield not only achieves …

Common Myths Regarding Document Destruction

From laws requiring the protection of personal information to company secrets, it has become increasingly important to properly destroy information before discarding it. Yet, there are many myths surrounding document destruction, some of which have significant repercussions. Listed below are ten common myths that may lead some astray when it comes to document destruction. Not all businesses have to shred. …

The Hidden Security Dangers of Your Office Copier Part II

In a previous blog entitled, “The Hidden Security Dangers of Your Office Copier” we discussed the dangers of information stored on office copiers. Since 2002, digital copy machines have been equipped with hard drives that save and store all scanned, faxed, and copied documents. One organization recently discovered this the hard way. Affinity Health Plan, Inc., of New York was …

Electronic Recycling Events

There are many reasons why we should be recycling our old and broken electronics. With e-waste being the United States’ fastest growing waste stream and contributing to over 70% of the hazardous waste in our landfills, it is astonishing that electronics are still only recycled at a rate of approximately 12%. The issue seems to be not that people do …

The Most Overlooked Aspect of Data Security

It just might be one of the most exciting occurrences in the work place, the IT upgrade. Keeping up with technology is difficult, and the promise of enhanced productivity and ease of use is alluring. A rush to upgrade, however, could deliver a devastating blow to your company’s data security. Sensitive Information Protecting sensitive and confidential data is a monumental …

What to Look for in an Electronic Recycler

Electronic waste poses a serious threat to both the environment and the population when disposed of incorrectly.  Electronic waste, or e-waste, represents the fastest growing segment of waste in the industrialized world. Recycling your old electronics helps to keep your home and organization free from the piles of old equipment, helping to create a cleaner, healthier, and safer environment. As …

It is all About Your Written Policies and Procedures

“… It’s really not about patient data security,” Larry Ponemon, founder of the Ponemon Institute, told InformationWeek Healthcare. “Things aren’t getting better – they’re getting worse.” Since the beginning of 2010, Ponemon Institute has seen an increase of over 36% in data security threats to healthcare organizations. “Almost every hospital [surveyed] suffered one data breach, and 45% suffered more than …

New Law Would Limit Exports of Electronic Waste

On July 23rd of this year, a bill prohibiting the exporting of electronic waste in order to avoid improper and dangerous disposal was introduced to the U.S. House of Representatives.  H.R. 2791, The Responsible Electronics Recycling Act of 2013 (RERA) is an amendment to The Resource Conservation and Recovery Act (RCRA) which already restricts the export of ‘restricted electronic waste’ …

Erasing Hard Drives not Effective Against Data Loss

Recent data indicates that over 340 million new computers are sold on an annual basis, 75% of which are replacements for older units. If you do the math, that is approximately 255,000,000 computers being replaced and retired every year. Most of these PC’s end up at recycling facilities or organizations that ‘promise’ to erase your personal information. These companies use …

Why “Delete” Isn’t Enough

When you delete a file on your computer do you consider it gone? If you answered yes you are not alone. So many people today think that if they clear their computer history, delete files and cookies, and empty their recycle bins, they have done enough to protect themselves. While it is a good start it certainly is not enough …