If it’s time to replace your IT equipment, then it’s time to double check that your data security policy contains a secure chain of custody and an electronic data...
Read moreHow to Select the Right Asset Disposition Vendor
The success of a lifecycle management program for your company’s IT equipment is dependent on the rigor of your end-to-end process including the selection of an asset...
Read more6 Essential Components of Your ITAD Solution
In the data destruction business, there are industry acronyms that we assume everyone understands: “ITAD”, Information Technology Asset Disposition, is one of the...
Read moreDiscarded Computers, Devices and Systems Still Contain Lots of Personal and Confidential Information
The number of businesses that unwittingly dispose of computers with confidential data left on them remains remarkably high, despite the long-understood risks of not...
Read moreGuardian to Offer Asset Disposition Insight at ELFA Conference
Guardian Data Destruction is attending the upcoming ELFA Equipment Management Conference as asset disposition experts. The event, scheduled to run from February...
Read more[HIPAA Breach] Doctor to Patient: Sorry I Lost Your Data
Dear Patient, We regret to inform you that last week we learned that your personally identifiable information, including name, address, passport, date of birth, place...
Read moreWhy financial firms should care about 2 mm solid state shredding
So you’re an investment manager, RIA firm, broker/dealer, credit card company, payment processing firm, or hedge fund who has decided that it’s time to put your old...
Read moreBYOD Security – A Workplace Risk?
BYOD (bring your own device) is the policy where employee-owned devices are used in a business. Smartphones are the most common device used in BYOD settings, although...
Read more6 Tips for Understanding Server Life Cycle
In IT, your server is your lifeline. It is engineered to manage, store, and transport data on a consistent and efficient basis that is critical to the security of...
Read moreBuying Cyber Insurance – Why Consider It for Your Business
If you’re a homeowner in Florida during hurricane season, you’re going to need a backup generator. If there is a contamination issue in your town’s water supply...
Read more10 Tips to Keep Your Business Ahead of a Data Breach
The failure to secure data jeopardizes the confidentiality, integrity, and accountability of any business or individual. As high profile data breaches light up news...
Read moreCreating a “Security Blanket” for Data on the Cloud.
To be direct and to the point, just because your data may be stored in top of the line data centers with SAAS providers like Google or Salesforce doesn’t mean it’s...
Read more