June 18, 2018

A Look Back at Cybercrime in the First Quarter of 2018

Cybercrime made headlines in 2017, and so far, it has shown no signs of slowing down in 2018 either. Less than half of the year has passed, and there have already been numerous cybercrime incidents that have affected countless businesses and consumers. Here’s a look at some of the biggest cybercrimes from the first quarter […]

Read More

June 11, 2018

The Mobile Workforce’s Impact on Your ITAD Plan

Numerous studies have shown that the majority of employees enjoy working remotely. Employees who work remotely can avoid lengthy commutes and find more of a work-life balance. But, they aren’t the only ones who benefit from this arrangement. Offering remote work helps companies retain their talent, improve employee satisfaction, and increase productivity.Remote work is beneficial […]

Read More

June 4, 2018

How to Change ITAD Vendors Without Putting Sensitive Data At Risk

A relationship between a client and vendor rarely lasts forever. These relationships often end when the vendor significantly increases their prices, discontinues certain services, relocates, or goes out of business. A relationship between a client and vendor can also be severed when the client is simply unsatisfied with the quality of the vendor’s services.In most […]

Read More

May 28, 2018

On-Site Data Destruction vs. Off-Site Data Destruction

Hiring an e-waste recycler to handle the destruction of data on unwanted or obsolete IT assets is a smart business decision. Reliable e-waste recyclers don’t simply erase the data off of these devices—they destroy it. Once the data has been destroyed, it can no longer be recreated, which means businesses won’t have to worry about […]

Read More

May 8, 2018

How to Prevent Employee Theft of Retired IT Assets

Many people assume that hackers are responsible for all data breaches, but that’s not the case. It’s true that hackers outside of the affected organization are often behind data breaches, however an employee within the organization can also be to blame for a breach.If an employee steals a retired IT asset, they are also stealing […]

Read More

April 30, 2018

IT Asset Disposition (ITAD) For Fortune 500 Companies

The Fortune 500 list is made up of some of the most successful corporations in the country. According to Fortune magazine, the companies on the most recent list have over $12 trillion in revenue and account for two-thirds of the U.S. GDP. These 500 companies also generate $890 billion in profits and hold $19 trillion […]

Read More

April 23, 2018

What Should Be Included in Data Breach Response Plans?

A data breach response plan is an outline of how a company will react to respond in the event their data is compromised. Having this type of plan in place is crucial because it ensures you are not forced to make important decisions while also dealing with the chaos of a data breach.But, a data […]

Read More

April 10, 2018

5 Questions to Ask Data Destruction Companies About Their Data Destruction Practices

Before agreeing to do business with an e-waste recycler, it’s imperative to learn more about their data destruction practices. Many e-waste recyclers claim to destroy data that is brought in on unwanted electronic devices, but very few actually follow through with this promise. Protect your business–and your sensitive data–by asking e-waste recyclers these questions about […]

Read More

April 2, 2018

Hackers’ Latest Target: Law Firms

Cybersecurity experts have made it clear time and time again that every business–regardless of the size or industry–could be targeted by hackers at some point. Lately, it seems as if many hackers have set their sights on law firms located around the world.Law Firm Data Breaches in the NewsThe Panama Papers is perhaps the most […]

Read More