614-322-2222 or 877-770-8324

Asset Disposal

20
Oct

Data Destruction Myths

An IT Manager was heard to say recently “the hard drive is inoperable so let’s just send it to offsite recycling”. Another data center manager chimes in and adds, they “beat their units up with hammers and send them to the recycler”. An R2 recycling manager smiled and said “the last time I was at the recycler’s facility, I saw many people picking through the piles of e-waste and selecting all of the units that were not destroyed and purchasing them for a miniscule amount of cash.

20
Oct

Data breaches from lost or stolen media are the #1 source of large-scale data compromises.

Data breaches from lost or stolen media are the #1 source of large-scale data compromises.

  • The #1 cause of large-scale data breaches is loss of data-bearing media (disk, tape, USB drives, CD/DVD) during transport or from data centers.
  • Many organizations lack adequate controls to track, secure and destroy data-bearing devices.
  • Compliance with new Federal Standard for Data Destruction NIST 800-88 requires companies to review and upgrade their information security practices.
20
Oct

TechR 1-2-3

It is highly probable that your hard drives will be, at some point, obtained by unauthorized individuals. What are you doing to protect the intellectual property and data that is your responsibility?