TechR2

What’s New at TechR2?

Technicians connect RFID tags to each critical device in the datacenter, tracking the critical units and data bearing devices, while reporting to managers any critical information missing.

Manuals that make your job easier

In the Research and Development field, we begin with a problem definition, then, using a design process, we develop a product to meet and exceed your expectations.

The Security Solutions Center

The SSC is a showcase of our core capabilities and solution offerings based on TechR2’s ISO certifications. This area has been created for clients to visit, learn, watch and interact with tools and processes from our total comprehensive plan.

Solid State Device Wiping Solution

TechR2 Mobile Device Wiping Assemblies have 64 bit, Intel Core I5 Wiping Computers with powered hubs along with individual cables for ease of hook up to each portable piece of equipment. Each TechR2 technician can perform data erasure on many Android tablets or iOS mobile devices simultaneously.

Data breaches: Looking back at 2014

In 2014, over the 5 major industries (Financial, healthcare, educational, Government/military, and business/retail) there were 761 data breaches with an astounding 83 million + records exposed. This is pretty significant compared to the numbers from 2013 which saw 537 breaches and about 55 million in exposed records (IDtheftcenter.org, 2014).

About the Federal Information Security Modernization Act (FISMA)

Data security took another stride last week with the passing of the Federal Information Security Modernization Act (FISMA) which made it through the House and Senate without issue. It is currently on its way to the desk of the President. This was the first cyber bill of the lame-duck session.

ROI Savings Using an ISO 27001 Organization

Last month, a seminar was held locally with many of the information security professionals in our area and an expert spoke of the necessity of having the ISO 27001 certification. After the formal presentation, this person was answering several pointed questions. One of those queries was about using vendors who also have the ISO 27001 certification and the specialist stated the cost of using a company that did not also have the security standard was going to be sizable. The organization was going to have to allocate resources to implement the same ISO controls at the vendor’s location that they were using at their site to meet their security plan.

Introducing the TechR2 ebook, "5 Reasons Why Onsite Data Destruction is Crucial to Protecting Your Brand"

[vc_row type=”grid” video_bg=””][vc_column width=”1/3″ dp_animation=””][vc_column_text dp_animation=””]TechR2, the certified leader of the onsite data destruction industry, has created a concise, easy-to-read ebook detailing the reasons why onsite data destruction can save your brand’s reputation and save your company millions. Written to benefit everyone from small business owners to the CISO’s of billion dollar companies, this ebook […]

How to Securely Wipe Data from a Mobile Device

How to Securely Wipe Data from a Mobile Device Recently, I was reading the HIPAA COW POLICY/PROCEDURE WORKGROUP, DEVICE, MEDIA, AND PAPER RECORD SANITIZATION FOR DISPOSAL OR REUSE whitepaper from their website and found that they want the cell phones, smart phones, PDAs, tablets and similar devices wiped using a software solution. At TechR2, we […]

Technology Trends

“Mobile devices, cloud computing and big data analytics are blowing the old IT rules to pieces”- Information Week 9/17/12