TechR2

Manuals that make your job easier

In the Research and Development field, we begin with a problem definition, then, using a design process, we develop a product to meet and exceed your expectations.

The Security Solutions Center

The SSC is a showcase of our core capabilities and solution offerings based on TechR2’s ISO certifications. This area has been created for clients to visit, learn, watch and interact with tools and processes from our total comprehensive plan.

About the Federal Information Security Modernization Act (FISMA)

Data security took another stride last week with the passing of the Federal Information Security Modernization Act (FISMA) which made it through the House and Senate without issue. It is currently on its way to the desk of the President. This was the first cyber bill of the lame-duck session.

ROI Savings Using an ISO 27001 Organization

Last month, a seminar was held locally with many of the information security professionals in our area and an expert spoke of the necessity of having the ISO 27001 certification. After the formal presentation, this person was answering several pointed questions. One of those queries was about using vendors who also have the ISO 27001 certification and the specialist stated the cost of using a company that did not also have the security standard was going to be sizable. The organization was going to have to allocate resources to implement the same ISO controls at the vendor’s location that they were using at their site to meet their security plan.

Introducing the TechR2 ebook, "5 Reasons Why Onsite Data Destruction is Crucial to Protecting Your Brand"

[vc_row type=”grid” video_bg=””][vc_column width=”1/3″ dp_animation=””][vc_column_text dp_animation=””]TechR2, the certified leader of the onsite data destruction industry, has created a concise, easy-to-read ebook detailing the reasons why onsite data destruction can save your brand’s reputation and save your company millions. Written to benefit everyone from small business owners to the CISO’s of billion dollar companies, this ebook […]

How to Securely Wipe Data from a Mobile Device

How to Securely Wipe Data from a Mobile Device Recently, I was reading the HIPAA COW POLICY/PROCEDURE WORKGROUP, DEVICE, MEDIA, AND PAPER RECORD SANITIZATION FOR DISPOSAL OR REUSE whitepaper from their website and found that they want the cell phones, smart phones, PDAs, tablets and similar devices wiped using a software solution. At TechR2, we […]

TechR2 Stands Out at Celebration of Industry’s Best

July 31, 2014 – COLUMBUS, OH – Business of Security events are held several times a year throughout Central Ohio. Business of Security was founded in 2005 and has run over 120 events in the US. The executive panel format dubbed, “Roll the Dice” was launched in Columbus in 2013 and drew 135 people for both the inaugural event and the one held in July of 2014. Business of Security also conducts “Art of the Craft” networking events at the Actual Brewing Company that draw 85-100 people.

21% Increase in Data Breaches in the First Half of 2014

21% Increase in Data Breaches in the First Half of 2014

395 data breaches have occurred that have been reported in the U.S. so far this year [By July 2014], a 21 percent increase over the same period last year.
In some of the cases, laptops or thumb drives containing information were stolen. And in many of the cases, the breaches were attributed to poor data security practices or simple errors that could have been avoided.

Company vs. Service Provider: Data Breach Responsibility

have come across several articles over the past month or so that have talked about risk mitigation. This isn’t uncommon, but there was a recurring theme that I had to address. There has been confusion recently as to who holds more responsibility, the service provider or the company who created the data?