Policies and Procedures and Why They Matter
Most organizations have some type of destruction process in place for confidential information. Whether you utilize an outside service or
In the news
Most organizations have some type of destruction process in place for confidential information. Whether you utilize an outside service or
DataShield provides physical destruction and shredding of hard drives, data tapes, cell phones, and other electronic media. Depending on your needs, DataShield offers high-speed
Whether you have several old data tapes in a box or are refreshing an entire data center, DataShield is your source for
It’s a new year which means it’s time purge those documents and get shredding. In a year, a business will
It’s no secret that giving and receiving gifts is one of the highlights of the holiday season. However, we all
A blog we previously wrote detailed the dangers that go along with employees bringing their work home. As it turns out,
After nearly two years of pandemic life the concept of working from home or telecommuting is hardly new. In fact
The need to protect your identity and safeguard personal information has reached an all-time high. As technology improves and data
A 2017 study conducted by the National Association of Information Destruction (NAID) showed 40% of recycled computers contain personally identifiable information (PII). This is the largest study to date evaluating the presence of personal information on computers, phones, and tablets sold on the secondary market. Since so many of the devices we use have electronic storage, no one is safe
Tax season, for many people, means a nice, big refund check. For others, it means getting scammed. Tax identity theft occurs when identity thieves use a legitimate taxpayer’s identity to fraudulently file a tax return and claim a refund. The IRS is aware of this growing concern, but unfortunately, tax returns still get divvied out to thieves in identity theft
If you sell your old cell phone and it gets into the wrong hands, what would someone find? A list of login passwords nestled in a page on your notepad? An app for your bank with your username and password automatically saved? Or maybe you have an attached email account with copies of pay stubs, financial statements, court documents, and
The massive Target data breach won’t be escaping people’s minds anytime soon. What began as a case of credit card hacking turned into much more when Target released that hackers have PIN numbers as well. The latest news shows that even more secure data may be exposed than initially expected. Target Security Breach In a recent report on the breach,
These days, you can’t escape a retailer unscathed. Some places ask for your phone number at checkout, others want your email address. The really intrusive ones want your ZIP code. In all of these cases, a simple “no thanks” is necessary, or you could be a victim of identity fraud. According to the mobile marketing company LocalVox, 67% of customers
Contact Us