The Real Cost of “Free” Electronics Recycling (And How a Certificate of Destruction Protects You)
When businesses look for ways to dispose of old computers, servers, or hard drives, the word “free” can sound appealing.
In the news
When businesses look for ways to dispose of old computers, servers, or hard drives, the word “free” can sound appealing.
Most organizations have some type of destruction process in place for confidential information. Whether you utilize an outside service or
DataShield provides physical destruction and shredding of hard drives, data tapes, cell phones, and other electronic media. Depending on your needs, DataShield offers high-speed
Whether you have several old data tapes in a box or are refreshing an entire data center, DataShield is your source for
It’s a new year which means it’s time purge those documents and get shredding. In a year, a business will
It’s no secret that giving and receiving gifts is one of the highlights of the holiday season. However, we all
A blog we previously wrote detailed the dangers that go along with employees bringing their work home. As it turns out,
After nearly two years of pandemic life the concept of working from home or telecommuting is hardly new. In fact
Junk mail, receipts, business paperwork, credit card statements, and healthcare information—the list goes on and on. But the bottom line is it’s all paperwork that needs to be shredded. You know better than to discard personal information that could be used to commit identity theft in the trash, but is tackling it with your small office shredder really any better?
You can run but you can’t hide; GDPR is coming and it cannot be ignored. Essentially if you have a website you are affected. Tech Crunch describes the law as “data protection + teeth”. The penalties are enforceable and steep. Prepare for the GDPR If you collect data on any citizen of the EU they are entitled to know a
DownStream Data Coverage—what is it and why is it important? Security with DownStream Data Coverage Trusting your confidential information to a third party isn’t easy. You know how concerned you are about keeping your business and clients safe, but does your data destruction vendor have that same level of vigilance? What certifications do they carry? How do they vet
When working with an information security provider, it’s important to do your homework. How much do you really know about the company handling your confidential material? What Do You Need to Know Before Choosing a Vendor? You owe it to yourself, your clients and your employees to make sure you collaborate with accredited, trustworthy information security vendors. Here are a
Protecting your company’s information is our top priority. That’s why we believe in preventing problems before they happen. This is illustrated through our stringent compliance and understanding of HIPAA, FISMA, FACTA, and GLBA privacy rules. As the second in a series of four compliance blogs, we’ll explore the importance and meaning of FISMA. The Federal Information Security Management Act, also known
Contact Us