TechR2

IT Asset Decomissioning Policies: 7 Questions You Need to Ask

A decommissioning policy is important for many reasons. It helps you maintain compliance with local, state, and federal regulations. It creates an efficient process for your IT department, and most importantly it can save you from a costly data breach. Creating the policy can be difficult as there are many aspects that must be taken into consideration. Below are 7 things that should be considered when you are defining your company’s decommissioning policy:

Responsible IT Asset Recycling

Recent studies show that more than 1/3 of companies do not practice responsible IT Asset recycling. Proper IT asset disposal is more than just tossing out your old computers. It should be a security tactic, a measure of compliance, a part of your green initiatives, and also a tool that can add financial value to depreciated assets. IT asset disposal is more than just an obligation that companies have, it is a responsibility that should be taken seriously.

Does Your Company Have the Same IT Security Lapses as the VA?

Later this month, the inspector general of the U.S. Department of Veterans Affairs will release a security audit that identifies the IT weaknesses of non-classified government agencies, according to Data Breach Today. Surprisingly, the audit confirmed cyberthreats to the VA from both domestic and international hosts.

However, an expert quoted in the article noted that the same lapses uncovered at the VA are also prevalent in the private sector, and blamed a lack of education for failure to commit to basic security measures.

Compliance: Privacy Regulations Based on Industry

Compliance: Privacy Regulations Based on Industry [vc_row][vc_column width=”1/3″][vc_column_text]Protecting your brand and reputation is crucial to every organization as the number of data breaches is constantly on the rise. There are guidelines already in place for most organizations. Learn more about your industry’s regulations for data security. Do you accept payment via credit card? PCI, The […]

Outsource your IT without risking your data and device security

Outsource your IT without risking your data and device security [vc_row][vc_column width=”1/3″][vc_column_text]A 2013 Gartner report predicted the global IT outsourcing market to reach $288 billion, with Asia-Pacific, Latin America, and Great China markets expanding more than 13 percent. In a recent article, Bryan Britz, Research Vice President at Gartner, said, “Enterprise buyers pursuing hybrid IT […]

Is it IT’s job to convince their execs to prioritize data security?

Is it IT’s job to convince their execs to prioritize data security? [vc_row][vc_column width=”1/4″][vc_column_text]A recent blog post in Tech Republic cites an enlightening Ponemon Institute report about the effectiveness of security metrics. As it turns out, great security metrics typically don’t drive companies to enhance security. Why? It’s no surprise that IT people either feel […]

Is your CEO criminally liable if discarded data devices aren’t clean?

Is your CEO criminally liable if discarded data devices aren’t clean? IT professionals are often frustrated by CEOs and corporate executives who don’t prioritize data security. This is frequently a case of priorities and personalities rather than rational decision making. Last week we wrote about corporate executives imprisoned for improper disposal of technology waste. This […]

Retiring point of sale terminals? Protect your data.

Retiring point of sale terminals? Protect your data. We’ve all been to the grocery store, tried to sign the screen for our credit card purchase, and watched as our careful signature is rendered as an illegible scrawl. In-store credit card terminals and point of sale (POS) terminals don’t last forever. But what happens when they […]

Data Loss Prevention Best Practices

  Data loss prevention (DLP) is going to become even more important now that BYOD policies are taking over. It is important to understand what steps need to be taken and what considerations need to be made in order to protect your organization and its brand. We have touched on this subject before but its […]

Intense Expectations for Healthcare Security Predicted in 2014

  In 2013, 45% of data breaches were in the healthcare industry. Because of this, compliance and regulations in healthcare are expected to intensify throughout this calender year. This will not bode well for what healthcare privacy, information security, and compliance officers were wishing for this year. In a recent survey performed by ID experts […]