Managing the Spike in COVID-19 Related Scams and Identity Theft

The huge shifts in society brought on by the COVID-19 pandemic have left many people in vulnerable situations. And unfortunately, scammers and identity thieves are quick to take advantage of difficult times. Many new scams related to the pandemic have popped up in recent months, robbing people who are already under immense stress of their finances and identities. To prevent …

Dos and Don’ts of Secure Hard Drive Disposal

Destruction seems like a pretty simple process—render something unusable by breaking it. When it comes to hard drive destruction and data disposal, however, there can be a surprising amount of room for error. Just because you destroy old hard drives doesn’t mean their data can’t be retrieved and used against you. Data disposal goes beyond wiping files, smashing a hard …

How to Prevent Data Breaches Close to Home

We all hear about them.  Stories that hit the news about personal information that’s been breached.  They grab our attention, create anxiety and get us wondering how secure our data really is. Regardless of whether the company is local or national, a business we’ve interacted with or someplace we’ve never heard of we know data breaches affect millions of people. …

3 ways to get your employees excited about information security

In this day and age, it’s likely that most if not all of your employees use a computer, smartphone or tablet for work. Unfortunately with these modern conveniences comes considerable risk.  Cybercriminals are excellent at finding ways to obtain confidential information and much of it happens to unsuspecting employees where they spend a great deal of their time—on employer-issued devices. …

7 ways to keep your data secure when employees work from home

In addition to traditional benefits, more and more employers are offering additional benefits, including the flexibility to work from home, to keep employees engaged. Over the last 10 years, remote working arrangements have increased by 91%. In 2020, over 50% of the US workforce will be working remotely. With great flexibility comes great responsibility—for data security that is. Employees who …

Phishing and email scams to watch out for in 2020

We’re entering a new decade of technological advancements, literacy and expertise with more people than ever working online. However, as society becomes more knowledgeable about technology and computers, scammers are becoming more sophisticated. Online scams and phishing are inherent threats to internet users, but if you know the warning signs, you can protect yourself and your information. Your best defense …

How to make information security an integral part of your company culture

As news stories about the danger and destruction of data breaches appear more frequently, awareness of information security and security threats have grown. While the average person now likely has a basic understanding of the value of data security, that does not mean organizations have followed suit. Security awareness alone will not protect your organization from data breaches and threats. …

3 things you should do after a data breach

How to minimize damage and prevent future breaches. In 2019, over one-third of small businesses experienced a data breach or information security issue. Although data breaches at large organizations grab headlines, small organizations are often bigger targets and just as, if not more likely, to experience a breach than large corporations because they have enough valuable assets worth pursuing and …

The worst—and most preventable—data breaches of 2019

According to Dark Reading, a leading information security news source, 2019 is likely the worst year for cyber-attacks and data breaches in history. In just the first nine months of 2019, over 7.9 billion records were exposed from 5,000 breaches. Almost half of those records were exposed in six giant data breaches. While malicious actors were partly responsible for the …

How to find the best ITAD partner to keep your data safe

IT Asset Disposition is a small business essential, and the right partnership is the difference between security and vulnerability. All of the information that makes your business unique, organized, and successful exists somewhere on your company’s computer system. From financial records to proprietary processes to customer contacts, your electronic files have sensitive data that can determine the future of your …