Blog

In the news

Recent News

Internal Data Breach Dangers

A blog we previously wrote detailed the dangers that go along with employees bringing their work home. As it turns out,

The Small Office Shredder: Friend or Foe?

Junk mail, receipts, business paperwork, credit card statements, and healthcare information—the list goes on and on. But the bottom line is it’s all paperwork that needs to be shredded. You know better than to discard personal information that could be used to commit identity theft in the trash, but is tackling it with your small office shredder really any better?

Ready or Not GDPR is on the Way

You can run but you can’t hide; GDPR is coming and it cannot be ignored.  Essentially if you have a website you are affected.  Tech Crunch describes the law as “data protection + teeth”.  The penalties are enforceable and steep. Prepare for the GDPR If you collect data on any citizen of the EU they are entitled to know a

DownStream Data Coverage—What Is It and Why Is It Important?

DownStream Data Coverage—what is it and why is it important?   Security with DownStream Data Coverage Trusting your confidential information to a third party isn’t easy. You know how concerned you are about keeping your business and clients safe, but does your data destruction vendor have that same level of vigilance? What certifications do they carry? How do they vet

How Do You Vet Your Vendors?

When working with an information security provider, it’s important to do your homework. How much do you really know about the company handling your confidential material? What Do You Need to Know Before Choosing a Vendor? You owe it to yourself, your clients and your employees to make sure you collaborate with accredited, trustworthy information security vendors. Here are a

What is FISMA and What Makes DataShield an Expert in Compliance?

Protecting your company’s information is our top priority. That’s why we believe in preventing problems before they happen. This is illustrated through our stringent compliance and understanding of HIPAA, FISMA, FACTA, and GLBA privacy rules. As the second in a series of four compliance blogs, we’ll explore the importance and meaning of FISMA. The Federal Information Security Management Act, also known

Start Protecting Your Documents and Data Today with DataShield

HIPAA Compliant badge
GLBA Compliant badge
FACTA Compliant badge
FISMA Compliant badge

Contact Us