Deleted Does Not Mean Destroyed

Today, a majority of business is conducted online or electronically. Bank transactions, payments, applications, emails, etc., are all a part of our normal day to day activities online. This information is stored and recorded on the hard drives of the machines we are using, a treasure trove of information for an identity thief. No problem, just delete the information before …

DownStream Data Coverage – What Is It and Why Is It Important?

DownStream Data Coverage – what is it and why is it important?   Trusting your confidential information to a third party isn’t easy. You know how concerned you are about keeping your business and clients safe, but does your destruction vendor have that same level of vigilance?  What certifications do they carry?  How do they vet their employees?  Where does …

2016 National Association of Information Destruction Conference

Last week four members of the DataShield Team attended NAID’s annual conference in Orlando, FL. As AAA NAID Certified providers it is our job to keep up to date on everything that involves information security so you don’t have to. After attending many sessions and talking to colleagues from around the country and the globe there is no doubt that …

What’s Your Personal Data Worth on the Dark Web?

Recent data breaches involving health insurance giant Anthem Inc. and Community Health Systems, one of the nation’s leading operators of general acute care hospitals that operates in 29 states, has patients on high alert their personal information may be compromised. So just what is the cost for thieves to obtain your personal data including banking information, personal health records and even your Facebook account …

Second Largest Health Insurer is Latest Victim to Cyber Attack

Forty million U.S. customers of Anthem Inc are on high alert of possible identity theft after the health insurer reported a massive cyber security breath. The company said the “very sophisticated attack” involved one of its IT systems and hackers stole former and current customers’ birthdays, social security numbers and contact and employment information including income data. To read the …

Famous Data Security Breaches (and how they could’ve been avoided)

Most of us put our trust in the companies, both online and in person, that hold on to our secure information. Unfortunately computer hackers outmaneuver the security processes required by state and national laws and end up costing companies millions of dollars, but most importantly, confidential consumer information. The following famous data security breaches show vulnerabilities companies possess that allow …