Understanding Data Attacks and Prevention

Have you ever considered how data is most commonly breached? Taking the time to understand how you are at risk may significantly reduce and perhaps eliminate a data breach in your future. Understanding Your Risks The majority of information compromise comes from hacking followed by data either printed or electronic that is physically lost. The Identity Theft Resource Center (IRTC) …

What’s In Your Trash Can?

Most of us refer to what we put in the garbage can as trash. Identity thieves have a markedly different definition. These less-than-above-board individuals refer to the material in your garbage can as gleaming with possibility. What we throw away in the comfort of our own home or even in our place of business can be considered a day’s work …

Don’t Be a Victim of Identity Theft Fraud

Is your company’s data safe? Breaches of customer data today are growing in number. If you are a company who keeps records of your customers and handles credit cards, take caution. Breaches occur more often than you realize. Learn About Data Breaches A study by a data protection firm, Ponemon Institute, found that 85% of US organizations have experienced a …

The Negative Impacts of Improper Electronics Disposal?

Most of us are familiar with the latest gadget on the market; some of us may even carry it around in our back pocket or purse. Every few months a different company is releasing the latest and greatest electronic devices and there’s always demand to upgrade. Properly Dispose of Your Old Device Before Upgrading In the hustle and bustle of …

Choosing a Qualified Data Destruction Company

The following article outlines important questions a business or individual should consider before hiring a data destruction company.  The list below is a reprint from an article published by Network World of the 13 characteristics potential customers should consider. How to Choose a Data Destruction Company How well does the service understand the various government guidelines or security classifications regarding …

An Expensive Oversight over Private Information

Running a successful and efficient business is something owners, shareholders and engaged employees alike aspire to do.  It goes without saying that the increasing demands on our time, a struggling economy and the desire to do more with less drive business decisions.  Determining what takes precedence and where precious resources get spent is incredibly important.  This brings me to the …

How to Protect Yourself from Identity Theft

Jeff Lanza, a former FBI agent, recently spoke in Omaha about cyber fraud and identity theft.  He gave a number of tips regarding protecting yourself and your business from falling prey to these types of white collar crime.  Below are the highlights of this informative session: How to Protect Yourself from Identity Theft Omaha has the 5th highest incidence of …

Datashield at Omaha Earth Day 2012

The 42nd anniversary of Earth Day is fast approaching. What started as a grassroots movement to protect the environment has grown into an impressive force to be reckoned with demanding a plan for the future of our planet. Protecting Your Data, and the Environment At DataShield our primary effort is to protect information and destroy data, but we also believe in …

What are the Basel Convention and the Basel Ban?

The Basel Convention is an international treaty aimed at minimizing the amount of hazardous waste moved between countries.  Specifically it addresses waste moving from affluent, developed countries to less developed countries.  It also incorporates the reduction of hazardous waste, calls for waste to be managed as close to the source as possible and assists less developed countries with sound hazardous …