DownStream Data Coverage—What Is It and Why Is It Important?

DownStream Data Coverage—what is it and why is it important?   Security with DownStream Data Coverage Trusting your confidential information to a third party isn’t easy. You know how concerned you are about keeping your business and clients safe, but does your data destruction vendor have that same level of vigilance? What certifications do they carry? How do they vet …

National Association of Information Destruction Conference

Last week four members of the DataShield Team attended NAID’s annual conference in Orlando, FL. As AAA NAID Certified providers it is our job to keep up to date on everything that involves information security so you don’t have to. After attending many sessions and talking to colleagues from around the country and the globe there is no doubt that …

What’s Your Personal Data Worth on the Dark Web?

Recent data breaches involving health insurance giant Anthem Inc. and Community Health Systems, one of the nation’s leading operators of general acute care hospitals that operates in 29 states, has patients on high alert their personal information may be compromised. So just what is the cost for thieves to obtain your personal data including banking information, personal health records and even your Facebook account …

Second Largest Health Insurer is Latest Victim to Cyber Attack

Forty million U.S. customers of Anthem Inc are on high alert of possible identity theft after the health insurer reported a massive cyber security breath. The company said the “very sophisticated attack” involved one of its IT systems and hackers stole former and current customers’ birthdays, social security numbers and contact and employment information including income data. Anthem Cyber Security …

Study Reveals Confidential Information Found on Recycled Computers

A recent study conducted by the National Association of Information Destruction (NAID) showed 40% of recycled computers contain personally identifiable information (PII). This is the largest study to date evaluating the presence of personal information on computers, phones, and tablets sold on the secondary market. Since so many of the devices we use have electronic storage, no one is safe …

Famous Data Security Breaches in the US

Most of us put our trust in the companies, both online and in person, that hold on to our secure information. Unfortunately computer hackers outmaneuver the security processes required by state and national laws and end up costing companies millions of dollars, but most importantly, confidential consumer information. The following famous data security breaches show vulnerabilities companies possess that allow …