Data safety and destruction isn’t just a technological issue, it’s a human one as well – based on procedure and trust. So how do we build a more trustworthy process?
Are you going to try to get past that?! According to a 2015 study by IBM and the Ponemon Institute, the average data breach now costs a total of $6.5 Million or about $217 per lost or stolen record. That’s a new record high, and the trend is definitively on the way up. So what can you do to prevent or (God forbid) […]
Around here, we pride ourselves on effective data sanitization. We are a member of NAID, and we built our own accredited data erasure software to make it happen. Sanitization is the bedrock of a strong ITAD strategy and the primary risk-mitigator on hardware that has aged out of regular use. Should you trust […]
Accidents happen. Sometimes you leave an external drive at the coffee shop or you absentmindedly put your laptop into your checked luggage and it “walks” away. Or sometimes you hand equipment over to a recycler, like the Canadian military did, and it’s not securely wiped before it’s resold to someone who knows how […]
Coined by Intel in 2009 when their employees insisted on bringing their personal devices to work, the term “BYOD” (bring your own device) didn’t come into full prominence until the year 2012 as other corporations also began to recognize the benefits. Not only did BYOD allow employees to further customize their work […]