Blog

In the news

Recent News

3 Things You Need to Know About Third-Party Security Risks

In doing due diligence with your business’ security policies, it’s extremely important to make sure you understand every possible risk to your customers’ data. Here are 3 things you need to know about third-party security risks. Third-Party Security Risks 1. Your business is on the hook for third-party data breaches Despite whatever policies you may have laid out, your business

Think Twice Before Donating Your Old Electronics

With what seems to be an exponentially increasing amount of e-waste troubling the world these days, eCycling, or the safe recycling of electronics, has luckily also seen an increase in recent years. And while simply recycling electronics to be scrapped and safely disposed of is a good thing to do, furthering the life of your old computers and phones by

Written Policies: An Essential Element of a Secure Business

We’ve covered the importance of security policies—specifically as they relate to thumb drives. When it comes to security, though, thumb drives are only a small part of what is hopefully an all-encompassing set of guidelines meant to keep your business secure from data breaches. What we have for today is a few simple tips for keeping your business secure and

Flash drives: Are they a friend or foe?

USB flash drives have been around for the last 20 years and are still prevalent in day to day activities. These small and relatively inexpensive gadgets have allowed us to copy, store and transfer information making client presentations, large file sharing and work from home efforts much easier. But there is not an IT person around that doesn’t know they come

Excellence in Information Security – Protecting Assets

If your business is connected to the internet, you are a target Mobile devices & smart phones make business easier to transact – they also dramatically increase the likelihood for theft and fraudulent use of your most valuable company asset: information. Customer lists, job applications, invoices, medical records, credit card numbers, bank statements – all prime targets for the sophisticated

Start Protecting Your Documents and Data Today with DataShield

HIPAA Compliant badge
GLBA Compliant badge
FACTA Compliant badge
FISMA Compliant badge

Contact Us