Does deleting a file delete it for good? The answer is almost never—at least not right away.
It’s common knowledge that most data breaches are caused by user error. For example, lax security measures and bad daily habits create the perfect opportunity for hackers to swoop in and steal or encrypt data in a ransomware attack. Although poor security is the leading cause of data breaches, there’s another threat […]
Are you going to try to get past that?! According to a 2015 study by IBM and the Ponemon Institute, the average data breach now costs a total of $6.5 Million or about $217 per lost or stolen record. That’s a new record high, and the trend is definitively on the way up. So what can you do to prevent or (God forbid) […]
Around here, we pride ourselves on effective data sanitization. We are a member of NAID, and we built our own accredited data erasure software to make it happen. Sanitization is the bedrock of a strong ITAD strategy and the primary risk-mitigator on hardware that has aged out of regular use. Should you trust […]
Accidents happen. Sometimes you leave an external drive at the coffee shop or you absentmindedly put your laptop into your checked luggage and it “walks” away. Or sometimes you hand equipment over to a recycler, like the Canadian military did, and it’s not securely wiped before it’s resold to someone who knows how to […]
Coined by Intel in 2009 when their employees insisted on bringing their personal devices to work, the term “BYOD” (bring your own device) didn’t come into full prominence until the year 2012 as other corporations also began to recognize the benefits. Not only did BYOD allow employees to further customize their work […]