3 New Ways Companies Are At Risk For Security Breaches

Security Breaches
New technologies mean new conveniences and new risks. People give up more information to companies who ask for it without a second thought, but those companies that people give information to may be at risk to have it stolen through a security breach.Being aware of these risks can hel
Continue Reading ?

Proper Document Disposal: It’s Time to Join the 21st Century

Proper Document Disposal
Standard business practices evolve and adapt over time. We learn from our mistakes, regulations are put in place, and new procedures become the standard.These changes benefit businesses and their customers because they enhance efficiency and make data more secure. Sending Data From ca
Continue Reading ?

How To Assure Your Customers That Their Data Is Secure

Your customers put a lot of faith in you when they hand over their personal information.How do they know their data is truly secure when doing business with your company? There are a few ways to assure them that they’re data is secure. Post Security Handling Policies Posting informati
Continue Reading ?

How to Implement The Clean Desk Policy At Your Healthcare Facility

Healthcare Facility
The Clean Desk Policy is a great way to ensure sensitive information is secured, or destroyed, at the end of each day. Information left in the hands of your employees can be sensitive and contain the personal or financial information of your patients or clients.   Understanding t
Continue Reading ?

Are Your Employees Disposing Of Information Properly?

Disposing Of Information
Your company and customer information must be disposed of properly when it’s no longer needed. The proper destruction and disposal of sensitive material is ultimately your responsibility, and that includes anything your employees have disposed of. Procedures and Protocols Having writt
Continue Reading ?

How Legal Compliance Can Affect Business Security

Business Security
If you need more reason to be legally compliant when it comes to your business security, look no further. There are guidelines and laws everywhere you look on how to handle sensitive business information and the reason is simple – it’s very easy for criminals to steal identities
Continue Reading ?

4 Important Low-Tech Cybersecurity Measures

Low-Tech Cybersecurity Measures
Anyone and anything can be hacked, which can spell trouble for a business. While larger companies like Yahoo and Sony can afford bad publicity, smaller companies can find their growth stymied for years after one security breach. Even medium-sized companies could get knocked down a kno
Continue Reading ?

Customer Misconception: Only Large Records Purges Need Destruction (not daily paper)

Large Records Purges
from “Selling Information Disposition by the Book” (vol. 4) by: Bob Johnson, NAID CEO The third most costly misconception is when customers do not give appropriate attention to destroying the media that they discard on a daily basis in the normal course of business (usuall
Continue Reading ?

3 Forms of Media Destruction that Companies Need

media destruction
Technology has long been evolving and changing to meet the needs of businesses and consumers. In doing so, the platforms that information can be saved on have multiplied and this has made media destruction more complex. To keep your company and personal information safe, keep these fo
Continue Reading ?

Keep Your Personal Data Safe – How to Protect Yourself in the Age of Data Breaches

Data Breaches
It seems that barely a week goes by without another  high profile data breach. From the largest retailers in the world to hospitals and major employers, companies seem to be losing track of their data at an unprecedented rate. Whether those data breaches are the result of poor data se
Continue Reading ?