Lessons Learned at Business of Security Event

Last week members of the TechR2 team had the opportunity to interact with a group of seasoned Information Security leaders at a Business of Security networking event.

We had a great time learning from special guests: Cindi Hart, Kim L. Jones, Kent King, Larry Mead, Mike Scott, and Mark Tomallo. We thank them for sharing their expertise acquired through more than 100 combined years of experience in the information sector.

Throughout the course of the event, we realized that many people don’t think about “after the fact” IT security. Hacking and phishing are legitimate concerns but do you know where your hard drives go at night? (A question we find ourselves asking at TechR2 quite often) Off-network security can still be a threat to your brand when data-bearing devices considered to be off-network are not properly disposed of or contained.

Data breaches from lost or stolen media are the No. 1 source of large-scale data compromises. Most organizations do not have an adequate solution to track, secure, and destroy data-bearing devices. Regulations are becoming more strict and well-defined and if they are not followed properly, your brand is at risk.

When a data breach occurs, the CEO of that company can be held responsible, resulting in costly fines, loss of customer trust (as we’ve seen in high profile cases like the recent NHS Surrey breach), and even time in prison.Tear-A-Byte Onsite Data Eradication Patented Process

TechR2′s Tear-A-Byte® Patented Process solution utilizes leading edge technology, provides secure onsite data destruction with our NSA certified degausser, and is regulation compliant. Additional features of our TAB® solution include:

  • Secure onsite destruction to NIST800-88 specifications using certified people, processes and technologies.
  • Disk Security Containment Solutions confine and secure devices awaiting destruction.
  • Cloud-based application, which allows the client to create an inventory of devices and record their unique attributes.
  • Compliance with HIPAA, HITECH, PCI, SOX, GLBA, etc.
  • EPA recycling standards, as well as TechR2’s zero land fill policy.

[vc_row type=”grid” row_type=”section” bg_image_repeat=”repeat” padding_top=”24″ padding_bottom=”24″][vc_column dp_animation=””][vc_separator][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-left”][/vc_column][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-right”][/vc_column][/vc_row]

case studies

See More Case Studies

Datacenters are a cybersecurity target

I’m a recovering intelligence officer. I’m always a recovering intelligence officer for one trauma or another. And I’ve had the benefit, the pleasure, the honor to apply a lot of those skills I use in defense of our nation in the commercial section and in the commercial world as well, rising all the way to chief operating officer of a company that I thought was pretty obscure.

Learn more

Loss of data hurts everyone

Whether I’m a nation state targeting data, whether I’m a criminal enterprise targeting data, or a transnational organization targeting that, that data is valuable. And while it’s valuable to me, there is a negative externality to the people that I’m taking it from as well. It’s not a victimless crime, right?

Learn more

Datacenters are the obvious target

Anybody ever watch storage wars?
You can go on the dark web and buy drives like you were buying a storage unit. “I’ll give you a thousand dollars for that storage unit”. I know there’s got to be a couple thousand bucks worth of stuff in it. Your data out there is the same way.

Learn more
Contact us

Why risk it alone?
Get started today.

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.
Your benefits:
What happens next?
1

Schedule a call at your convenience

2

We do a discovery and consulting meeting 

3

We prepare a proposal 

Schedule a Free Consultation