3 Things to Know When Shredding Confidential Information

The need to protect your identity and safeguard personal information has reached an all-time high. As technology improves and data becomes more valuable there are countless reasons to be concerned. Shredding sensitive information is a surefire way stay vigilant and ensure your information stays private. Understanding these 3 rules helps to simplify the shredding process and declutter your space while …

What Every Business Should Know about HIPAA

If your business handles patient information, keep reading. Patient information security is highly regulated and should be taken very seriously. Maintaining proper patient records and keeping the information they contain confidential is your legal requirement. Violations to HIPPA regulations can cost you your reputation as well as thousands in fines. So what sensitive information is protected by HIPPA? According to …

Identity Theft-What Are the Chances

In 2019, according to Identity Force 14.4 million consumers were the victims of identity theft. Identity theft is largely defined as your personal information being used against you to commit fraud. Identity theft hurts your credit and reputation and can cost you time and money. Below are some unusual, but far too common examples of the crime. Identity theft victim …

Managing the Spike in COVID-19 Related Scams and Identity Theft

The huge shifts in society brought on by the COVID-19 pandemic have left many people in vulnerable situations. And unfortunately, scammers and identity thieves are quick to take advantage of difficult times. Many new scams related to the pandemic have popped up in recent months, robbing people who are already under immense stress of their finances and identities. To prevent …

3 things you should do after a data breach

How to minimize damage and prevent future breaches. In 2019, over one-third of small businesses experienced a data breach or information security issue. Although data breaches at large organizations grab headlines, small organizations are often bigger targets and just as, if not more likely, to experience a breach than large corporations because they have enough valuable assets worth pursuing and …

The Small Office Shredder: Friend or Foe?

Junk mail, receipts, business paperwork, credit card statements, and healthcare information—the list goes on and on. But the bottom line is it’s all paperwork that needs to be shredded. You know better than to discard personal information that could be used to commit identity theft in the trash, but is tackling it with your small office shredder really any better? …

What’s Your Personal Data Worth on the Dark Web?

Recent data breaches involving health insurance giant Anthem Inc. and Community Health Systems, one of the nation’s leading operators of general acute care hospitals that operates in 29 states, has patients on high alert their personal information may be compromised. So just what is the cost for thieves to obtain your personal data including banking information, personal health records and even your Facebook account …

3 Steps to Safe Guard the Office Copier from Data Breach

Multi-function copy machines are essential to the success of any business—from making copies to scanning documents and even sending emails. But small business owners beware: office copy machines can also pose a security threat to staff or clients. “Sixty to 70 percent of leased digital copiers are remarketed,” Carmen Pitarra said. “In today’s data-driven world, information can be easily obtained …

Resident Finds Confidential Documents in Apartment Dumpster

On March 12, residents of an Odessa, TX, apartment complex witnessed their worst fear: having their most private information exposed. Management of the apartment complex put their tenants at risk of identity theft by not taking secure measures to properly dispose of confidential documents. NewsWest 9 reported the following story: ODESSA, TX A disturbing find in a dumpster at an …

Study Reveals Confidential Information Found on Recycled Computers

A 2017 study conducted by the National Association of Information Destruction (NAID) showed 40% of recycled computers contain personally identifiable information (PII). This is the largest study to date evaluating the presence of personal information on computers, phones, and tablets sold on the secondary market. Since so many of the devices we use have electronic storage, no one is safe …