Lessons Learned at Business of Security Event

About Data Security,Data Breaches,TechR2 Blog

Lessons Learned at Business of Security Event

Last week members of the TechR2 team had the opportunity to interact with a group of seasoned Information Security leaders at a Business of Security networking event.

We had a great time learning from special guests: Cindi Hart, Kim L. Jones, Kent King, Larry Mead, Mike Scott, and Mark Tomallo. We thank them for sharing their expertise acquired through more than 100 combined years of experience in the information sector.

Throughout the course of the event, we realized that many people don’t think about “after the fact” IT security. Hacking and phishing are legitimate concerns but do you know where your hard drives go at night? (A question we find ourselves asking at TechR2 quite often) Off-network security can still be a threat to your brand when data-bearing devices considered to be off-network are not properly disposed of or contained.

Data breaches from lost or stolen media are the No. 1 source of large-scale data compromises. Most organizations do not have an adequate solution to track, secure, and destroy data-bearing devices. Regulations are becoming more strict and well-defined and if they are not followed properly, your brand is at risk.

When a data breach occurs, the CEO of that company can be held responsible, resulting in costly fines, loss of customer trust (as we’ve seen in high profile cases like the recent NHS Surrey breach), and even time in prison.Tear-A-Byte Onsite Data Eradication Patented Process

TechR2′s Tear-A-Byte® Patented Process solution utilizes leading edge technology, provides secure onsite data destruction with our NSA certified degausser, and is regulation compliant. Additional features of our TAB® solution include:

  • Secure onsite destruction to NIST800-88 specifications using certified people, processes and technologies.
  • Disk Security Containment Solutions confine and secure devices awaiting destruction.
  • Cloud-based application, which allows the client to create an inventory of devices and record their unique attributes.
  • Compliance with HIPAA, HITECH, PCI, SOX, GLBA, etc.
  • EPA recycling standards, as well as TechR2’s zero land fill policy.

[vc_row type=”grid” row_type=”section” bg_image_repeat=”repeat” padding_top=”24″ padding_bottom=”24″][vc_column dp_animation=””][vc_separator][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-left”][/vc_column][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-right”][/vc_column][/vc_row]

Tags :
business of security,certificate of destruction,certified data destruction,compliance,computer disposal,data breach,data destruction,data destruction services,data security,data vulnerability,electronics recycling,HIPAA,HITECH,information security,ISO 27001,IT asset disposal,IT asset disposition,it asset management,ITAD,mobile device security,mobile risk management,PCI,R2 certified,risk management strategies,security breach,tear-a-byte,techr2
Share This :

Recent Posts