How Hackers Can LEGALLY Get Your Critical Data…

If you’ve been to college, you know the story: you’re walking home and BAM! There it is.  The most amazing couch you’ve ever seen in your life, just sitting there on the corner.  It is like God himself presented you with the most amazing place to watch TV in the universe.  So, you bring it […]

ITAD is On-Notice…

Some big things are coming out of the innovation labs at TechR2.  ITAD consumers should be excited.  Check out the video and be sure to come back throughout the month for more updates.

Backblaze’s Drive Failure Report was Just Released; And the Winner Is…

The biggest question most datacenter operators need to be asking right now with SSD’s dropping in price is this:  Is it now finally worth the cost?  Sure, manufacturers say these drives are more reliable.  And certainly, any benchmark will show you SSD’s are significantly faster.  But with SSD’s becoming more popular, this leaves us with […]

Every hole in your data security plan just increases the probability that your organization is the next in the chain of breaches.

As privateers and nation-state perpetrators continue to successfully probe US cyber defenses, they effectively penetrated the agriculture industry last week. The cyber attackers have mostly ignored any warnings from the US government stating that the critical infrastructure is off limits. Organizations in the US and Europe need to re-assess their strategy for how they do business

TechBox™ for Enterprise

The TechR2 TechBox™ is a lockable, efficient, and cost effective solution for your IT asset disposal needs. The flat rate cost includes shipping, processing of IT assets, a detailed audit report and Certificate of Destruction. We follow the ISO 14001 Environmental Health and Safety Systems. We honor a zero landfill policy and take pride in our role in honoring the environment.

International Certifications: TechR2 Client Reach Demands

Why does Columbus, Ohio based TechR2 have so many expensive, difficult to earn, difficult to maintain, globally respected certifications?
Why are standards critical to controlling data eradication processes?
Why should e-waste not use destruction technologies meant for paper?

SAFENOTES, August 2015

The shredding industry tells us they safely destroy data bearing devices at our workplaces and that our workers will be fine. We should reflect on the processes where circuit boards are manufactured and the protection employees receive on the factory line.

A Plethora of TechR2 Products and Services

Onsite Training is available for all companies using the Tear-A-Byte® process. Contact our Client Relations team to schedule the training session and even better yet, get your team certified so your group is working efficiently and you have the training documentation available for your next audit.