It is all About Your Written Policies and Procedures

“… It’s really not about patient data security,” Larry Ponemon, founder of the Ponemon Institute, told InformationWeek Healthcare. “Things aren’t getting better – they’re getting worse.” Since the beginning of 2010, Ponemon Institute has seen an increase of over 36% in data security threats to healthcare organizations. “Almost every hospital [surveyed] suffered one data breach, and 45% suffered more than …

Convenience Drives Compliance

The Path of Least Resistance The “path of least resistance,” is a simple concept; things will choose the easiest path possible. Electricity for example—will always choose the path of least resistance hence, lightning, short circuits, complete circuits. Exciting stuff, yeah? Well, the concept of the “path of least resistance” is applicable to document destruction and compliance as well. We all …

Bringing Your Work Home? Check Your Security Policy

A recent study by Czech security software firm Safetica has found that a third of employees admitted to using social media on their company computer during work hours, with another 12 percent admitted to taking home company files or emailing them to a private email, Workplace Savings and Benefits notes. Obviously, not all of these problems can be completely eliminated—short …

Why should you shred old documents

We all know we should destroy confidential documents but knowing why may be less apparent. If you’re reading this blog you already know that paper shredding has value and can protect you, but let’s go through the reasons why. Why shredding sensitive information is critical: It’s the law. If you own a business, you handle sensitive information and personal data. In this case …

“Argo [Protect] Yourself.”

This past Sunday, the movie Argo took home the Oscar for best picture at the Academy Awards. In the movie, which is based on the 1979 Iranian hostage crisis, a group of Americans race against the clock to escape the country while Iranian workers try their best to sort through shredded documents detailing their identities. But could that ever really …

Who’s Reading Your Trash? 3 Reasons FACTA Compliance is More Than a Technicality

In today’s data-driven world, it’s hard to imagine any business having a shortage of sensitive client information—making data destruction vital. Whether dealing with patient records at a doctor’s office, tax files at an accounting firm, or a stack of social security numbers locked up in a filing cabinet in a government building, there’s no denying there is a lot of …

You Shred—Now What?

Businesses largely understand the importance of properly destroying sensitive information.  They are not only regulated and can face fines for not doing so, but they also recognize the danger of breaching private information and what it means for their reputation in the marketplace. This raises an interesting question: Is shredding your paper enough to keep your confidential information safe? The …

Understanding Data Attacks and Prevention

Have you ever considered how data is most commonly breached? Taking the time to understand how you are at risk may significantly reduce and perhaps eliminate a data breach in your future. Understanding Your Risks The majority of information compromise comes from hacking followed by data either printed or electronic that is physically lost. The Identity Theft Resource Center (IRTC) …