June 4, 2018

How to Change ITAD Vendors Without Putting Sensitive Data At Risk

A relationship between a client and vendor rarely lasts forever. These relationships often end when the vendor significantly increases their prices, discontinues certain services, relocates, or goes out of business. A relationship between a client and vendor can also be severed when the client is simply unsatisfied with the quality of the vendor’s services.In most […]

Read More

May 28, 2018

On-Site Data Destruction vs. Off-Site Data Destruction

Hiring an e-waste recycler to handle the destruction of data on unwanted or obsolete IT assets is a smart business decision. Reliable e-waste recyclers don’t simply erase the data off of these devices—they destroy it. Once the data has been destroyed, it can no longer be recreated, which means businesses won’t have to worry about […]

Read More

May 8, 2018

How to Prevent Employee Theft of Retired IT Assets

Many people assume that hackers are responsible for all data breaches, but that’s not the case. It’s true that hackers outside of the affected organization are often behind data breaches, however an employee within the organization can also be to blame for a breach.If an employee steals a retired IT asset, they are also stealing […]

Read More

April 30, 2018

IT Asset Disposition (ITAD) For Fortune 500 Companies

The Fortune 500 list is made up of some of the most successful corporations in the country. According to Fortune magazine, the companies on the most recent list have over $12 trillion in revenue and account for two-thirds of the U.S. GDP. These 500 companies also generate $890 billion in profits and hold $19 trillion […]

Read More

April 23, 2018

What Should Be Included in Data Breach Response Plans?

A data breach response plan is an outline of how a company will react to respond in the event their data is compromised. Having this type of plan in place is crucial because it ensures you are not forced to make important decisions while also dealing with the chaos of a data breach.But, a data […]

Read More

April 10, 2018

5 Questions to Ask Data Destruction Companies About Their Data Destruction Practices

Before agreeing to do business with an e-waste recycler, it’s imperative to learn more about their data destruction practices. Many e-waste recyclers claim to destroy data that is brought in on unwanted electronic devices, but very few actually follow through with this promise. Protect your business–and your sensitive data–by asking e-waste recyclers these questions about […]

Read More

April 2, 2018

Hackers’ Latest Target: Law Firms

Cybersecurity experts have made it clear time and time again that every business–regardless of the size or industry–could be targeted by hackers at some point. Lately, it seems as if many hackers have set their sights on law firms located around the world.Law Firm Data Breaches in the NewsThe Panama Papers is perhaps the most […]

Read More

March 27, 2018

The Link Between Data Breaches and Customer Loyalty

Cybersecurity is a growing problem. According to the Identity Theft Research Center, there were over 1,100 breaches in 2017 and more than 170 million compromised records. In 2016, there were around 1,000 breaches and over 36 million compromised records. This shows that although there was not a significant difference in the number of breaches in […]

Read More