How to make information security an integral part of your company culture

As news stories about the danger and destruction of data breaches appear more frequently, awareness of information security and security threats have grown. While the average person now likely has a basic understanding of the value of data security, that does not mean organizations have followed suit. Security awareness alone will not protect your organization from data breaches and threats. …

3 things you should do after a data breach

How to minimize damage and prevent future breaches. In 2019, over one-third of small businesses experienced a data breach or information security issue. Although data breaches at large organizations grab headlines, small organizations are often bigger targets and just as, if not more likely, to experience a breach than large corporations because they have enough valuable assets worth pursuing and …

The worst—and most preventable—data breaches of 2019

According to Dark Reading, a leading information security news source, 2019 is likely the worst year for cyber-attacks and data breaches in history. In just the first nine months of 2019, over 7.9 billion records were exposed from 5,000 breaches. Almost half of those records were exposed in six giant data breaches. While malicious actors were partly responsible for the …

How to find the best ITAD partner to keep your data safe

IT Asset Disposition is a small business essential, and the right partnership is the difference between security and vulnerability. All of the information that makes your business unique, organized, and successful exists somewhere on your company’s computer system. From financial records to proprietary processes to customer contacts, your electronic files have sensitive data that can determine the future of your …

Deleted Does Not Mean Destroyed

Today, a majority of business is conducted online or electronically. Bank transactions, payments, applications, emails, etc., are all a part of our normal day to day activities online. This information is stored and recorded on the hard drives of the machines we’re using which can be a treasure trove of information for an identity thief. So you think, it’s no …

The Small Office Shredder: Friend or Foe?

Junk mail, receipts, business paperwork, credit card statements, and healthcare information—the list goes on and on. But the bottom line is it’s all paperwork that needs to be shredded. You know better than to discard personal information that could be used to commit identity theft in the trash, but is tackling it with your small office shredder really any better? …

DownStream Data Coverage—What Is It and Why Is It Important?

DownStream Data Coverage—what is it and why is it important?   Security with DownStream Data Coverage Trusting your confidential information to a third party isn’t easy. You know how concerned you are about keeping your business and clients safe, but does your data destruction vendor have that same level of vigilance? What certifications do they carry? How do they vet …

How Do You Vet Your Vendors?

When working with an information security provider, it’s important to do your homework. How much do you really know about the company handling your confidential material? What Do You Need to Know Before Choosing a Vendor? You owe it to yourself, your clients and your employees to make sure you collaborate with accredited, trustworthy information security vendors. Here are a …

What is FISMA and What Makes DataShield an Expert in Compliance?

Protecting your company’s information is our top priority. That’s why we believe in preventing problems before they happen. This is illustrated through our stringent compliance and understanding of HIPAA, FISMA, FACTA, and GLBA privacy rules. As the second in a series of four compliance blogs, we’ll explore the importance and meaning of FISMA. The Federal Information Security Management Act, also known …