TechR2

Data Destruction Myths

An IT Manager was heard to say recently “the hard drive is inoperable so let’s just send it to offsite recycling”. Another data center manager chimes in and adds, they “beat their units up with hammers and send them to the recycler”. An R2 recycling manager smiled and said “the last time I was at the recycler’s facility, I saw many people picking through the piles of e-waste and selecting all of the units that were not destroyed and purchasing them for a miniscule amount of cash.

Data breaches from lost or stolen media are the #1 source of large-scale data compromises.

Data breaches from lost or stolen media are the #1 source of large-scale data compromises.

  • The #1 cause of large-scale data breaches is loss of data-bearing media (disk, tape, USB drives, CD/DVD) during transport or from data centers.
  • Many organizations lack adequate controls to track, secure and destroy data-bearing devices.
  • Compliance with new Federal Standard for Data Destruction NIST 800-88 requires companies to review and upgrade their information security practices.

Good Documentation Practices

ISO standards all contain the same basic premise: Say what you do (formulate manuals and procedure policies), do what you say and document it (create and implement internal forms and necessary documentation). Ultimately, documents are evidence that the actions or tasks have been performed, therefore, all documentation should be concise, legible, accurate, and traceable

TechR 1-2-3

It is highly probable that your hard drives will be, at some point, obtained by unauthorized individuals. What are you doing to protect the intellectual property and data that is your responsibility?

Data Storage Device Stolen from Lloyds Bank

Data Storage Device Stolen from Lloyds Bank Sept. 14, 2015. A data storage device was recently stolen from a Lloyds’ Bank data center two months ago containing personal data including customer names, addresses, and account numbers for Lloyds’ Premier Account customers. Read More [vc_row type=”grid” row_type=”section” bg_image_repeat=”repeat” padding_top=”24″ padding_bottom=”24″][vc_column dp_animation=””][vc_separator][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-left”][/vc_column][vc_column […]

DS Recap, August 14, 2015

[vc_row type=”grid” video_bg=””][vc_column dp_animation=””][vc_column_text dp_animation=””] DSRecap Data Security Recap – A Weekly eBulletin from TechR2 In 2015, cost of data breaches surpass overall federal IT investment Reported by Indianapolis Business Journal   Read More Acquire a strong security posture today! Equipped with our advanced data-at-rest security solutions, trained and experienced in industry best practices and […]

SAFENOTES, August 2015

The shredding industry tells us they safely destroy data bearing devices at our workplaces and that our workers will be fine. We should reflect on the processes where circuit boards are manufactured and the protection employees receive on the factory line.

Data Security is Our #1 Priority

Data Security and Risk Mitigation is our primary focus to reduce the risk of brand compromise within your organization. According to the Ponemon Institute, 2015 Cost of a Data Breach Study, the average cost of a data breach is $3.79 million dollars this is a 23% increase in the total cost.

A Plethora of TechR2 Products and Services

Onsite Training is available for all companies using the Tear-A-Byte® process. Contact our Client Relations team to schedule the training session and even better yet, get your team certified so your group is working efficiently and you have the training documentation available for your next audit.

Wiping Safely or Shredding UNenvironmentally

The shredding industry tells us they safely destroy data bearing devices at our workplaces and that our workers will be fine. We should reflect on the processes where circuit boards are manufactured and the protection employees receive on the factory line.