TechR2

Data Loss Prevention Best Practices

  Data loss prevention (DLP) is going to become even more important now that BYOD policies are taking over. It is important to understand what steps need to be taken and what considerations need to be made in order to protect your organization and its brand. We have touched on this subject before but its […]

New study on hard drive failure rates surprises many.

[vc_row type=”grid” video_bg=”” css=”.vc_custom_1644068845848{padding-top: 80px !important;padding-bottom: 40px !important;}”][vc_column width=”1/2″ dp_animation=””][vc_column_text dp_animation=””]Online backup specialists Backblaze completed a study on the reliability of hard drive brands currently on the market, and the results were very interesting. The study consisted of over 25,000 drives (27,134 to be exact) from the industries top manufacturers Hitachi, Seagate, Western Digital, Toshiba, […]

Recent data breaches once again sparks credit card technology debate

[vc_row type=”grid” video_bg=”” css=”.vc_custom_1644068749869{padding-top: 80px !important;padding-bottom: 40px !important;}”][vc_column width=”1/2″ dp_animation=””][vc_column_text dp_animation=””]Recent data breaches in the US (mainly Target and Neiman Marcus) have once again sparked the age old debate of magnetic strip cards vs. EMV (Europay/Mastercard/Visa) chip cards. Whenever a store completes a transaction the data from that transaction is stored on the organization’s servers. […]

Onsite Data Destruction: How do I get started?

[vc_row type=”grid” video_bg=”” css=”.vc_custom_1644068629826{padding-top: 80px !important;padding-bottom: 40px !important;}”][vc_column width=”1/2″ dp_animation=””][vc_column_text dp_animation=””] Here are 3 Easy Ways to Start Developing an onsite data destruction program. 1. Take an inventory of all devices with business data on them (old and new). It is important you know what type of data your organization has stored, and where information […]

What are the consequences of not having an onsite data destruction plan?

Wouldn’t it be nice if data at rest did not have to be a concern on a failed hard drive, or on old assets being removed from your network? It would, right? Unfortunately that type of future will not be ours anytime soon. What are the REAL consequences of not having an onsite data destruction […]

Data recovered off hard drive involved in Space Shuttle crash

[vc_row type=”grid” video_bg=”” css=”.vc_custom_1644067824706{padding-top: 80px !important;padding-bottom: 40px !important;}”][vc_column width=”1/2″ dp_animation=””][vc_column_text dp_animation=””]Computer World released an interesting article the other day about a hard drive from the space ship Columbia. The same spaceship Columbia which disintegrated coming back into our atmosphere back in 2003. Among the wreckage and debris was a hard drive, which at first glance […]

4 Steps Your IT Asset Disposition Vendor Should be Taking to Protect You

4 Steps Your IT Asset Disposition Vendor Should be Taking to Protect You Most companies IT asset disposition programs are often overlooked.  A formal security policy and responsible technology recycling should play a key part in your risk management strategy.  It is even more important that you know what steps your IT asset disposal (ITAD) vendor is taking to ensure your company […]

FAQs

[vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_column_text dp_animation=””] Frequently Asked Questions How do I know when it’s time to redistribute, or redeploy my organization’s technology assets? Hardware will be overtaken within three years or fewer by new models that are better, faster, and cheaper than what you paid for existing models. The life cycle of computers is […]

The Cost of a Data Breach

The Cost of a Data Breach The average data breach costs a company $5M1. The second leading cause for data breaches, behind hacking, is a lost or stolen data-bearing device. A company that fails to implement NIST or follow other government data disposal practices increases their liability risk should a data incident occur. Nearly all […]