TechR2

Top 5 Ways to Ensure Data Security

Top 5 Ways to Ensure Data Security According to NIST 800-88 guidelines, it is critical that a business or organization, maintain a record of its data destruction to track the “who, what, when, where, why” of how the data was retired. Only a clear record of proper disposal can protect a business from the harm […]

The High Cost of "Free" Data Destruction

The High Cost of “Free” Data Destruction IT asset disposal made headlines around the world last week when the UK Information Commissioner’s Office (ICO) fined NHS Surrey £200,000 (about $300,000) over loss of secret data of more than 3,000 patients. According to the data watchdog, thousands of patient records were discovered on a second-hand NHS […]

Outsource your IT without risking your data and device security

Outsource your IT without risking your data and device security [vc_row][vc_column width=”1/3″][vc_column_text]A 2013 Gartner report predicted the global IT outsourcing market to reach $288 billion, with Asia-Pacific, Latin America, and Great China markets expanding more than 13 percent. In a recent article, Bryan Britz, Research Vice President at Gartner, said, “Enterprise buyers pursuing hybrid IT […]

Lessons Learned at Business of Security Event

Lessons Learned at Business of Security Event Last week members of the TechR2 team had the opportunity to interact with a group of seasoned Information Security leaders at a Business of Security networking event. We had a great time learning from special guests: Cindi Hart, Kim L. Jones, Kent King, Larry Mead, Mike Scott, and […]

Is your CEO criminally liable if discarded data devices aren’t clean?

Is your CEO criminally liable if discarded data devices aren’t clean? IT professionals are often frustrated by CEOs and corporate executives who don’t prioritize data security. This is frequently a case of priorities and personalities rather than rational decision making. Last week we wrote about corporate executives imprisoned for improper disposal of technology waste. This […]

Retiring point of sale terminals? Protect your data.

Retiring point of sale terminals? Protect your data. We’ve all been to the grocery store, tried to sign the screen for our credit card purchase, and watched as our careful signature is rendered as an illegible scrawl. In-store credit card terminals and point of sale (POS) terminals don’t last forever. But what happens when they […]

Back to School: Is your student data safe?

Back to School: Is your student data safe? Families everywhere are preparing their students to go back to school, and the schools themselves are preparing themselves for the student invasion. But are schools prepared for the student data security challenges? Anyone who has a student knows that sensitive data, such as social security numbers and […]

Middle school teachers aren’t data security agents. They need help.

Middle school teachers aren’t data security agents. They need help. Earlier this year in a small town in Georgia, a middle school teacher saved a spreadsheet of student data from a school computer onto a flash drive, so she could take it home. The teacher left the flash drive in her car. You can guess […]

TechR2 Achieves ISO 27001 Certification!

TechR2 Achieves ISO 27001 Certification! When your company works with a consultant or vendor for data security, you can’t afford for that vendor to have mediocre management practices. And if you are trusting someone else with your IT security, they had better be top notch. An easy way to objectively measure effectiveness and security is […]

Cloud Security Alliance identifies new data security risks

Cloud Security Alliance identifies new data security risks The Cloud may be a hole in your data security. As concerns grow regarding how secure your data really is when stored in the Cloud, the industry must react. The Cloud Security Alliance (CSA) has made additions to the guidelines of its Cloud Control Matrix (CCM). This […]