7 ways to keep your data secure when employees work from home

In addition to traditional benefits, more and more employers are offering additional benefits, including the flexibility to work from home, to keep employees engaged. Over the last 10 years, remote working arrangements have increased by 91%. In 2020, over 50% of the US workforce will be working remotely. With great flexibility comes great responsibility—for data security that is. Employees who …

Phishing and email scams to watch out for in 2020

We’re entering a new decade of technological advancements, literacy and expertise with more people than ever working online. However, as society becomes more knowledgeable about technology and computers, scammers are becoming more sophisticated. Online scams and phishing are inherent threats to internet users, but if you know the warning signs, you can protect yourself and your information. Your best defense …

How to make information security an integral part of your company culture

As news stories about the danger and destruction of data breaches appear more frequently, awareness of information security and security threats have grown. While the average person now likely has a basic understanding of the value of data security, that does not mean organizations have followed suit. Security awareness alone will not protect your organization from data breaches and threats. …

The worst—and most preventable—data breaches of 2019

According to Dark Reading, a leading information security news source, 2019 is likely the worst year for cyber-attacks and data breaches in history. In just the first nine months of 2019, over 7.9 billion records were exposed from 5,000 breaches. Almost half of those records were exposed in six giant data breaches. While malicious actors were partly responsible for the …

Deleted Does Not Mean Destroyed

Today, a majority of business is conducted online or electronically. Bank transactions, payments, applications, emails, etc., are all a part of our normal day to day activities online. This information is stored and recorded on the hard drives of the machines we’re using which can be a treasure trove of information for an identity thief. So you think, it’s no …

DownStream Data Coverage—What Is It and Why Is It Important?

DownStream Data Coverage—what is it and why is it important?   Security with DownStream Data Coverage Trusting your confidential information to a third party isn’t easy. You know how concerned you are about keeping your business and clients safe, but does your data destruction vendor have that same level of vigilance? What certifications do they carry? How do they vet …

2016 National Association of Information Destruction Conference

Last week four members of the DataShield Team attended NAID’s annual conference in Orlando, FL. As AAA NAID Certified providers it is our job to keep up to date on everything that involves information security so you don’t have to. After attending many sessions and talking to colleagues from around the country and the globe there is no doubt that …

What’s Your Personal Data Worth on the Dark Web?

Recent data breaches involving health insurance giant Anthem Inc. and Community Health Systems, one of the nation’s leading operators of general acute care hospitals that operates in 29 states, has patients on high alert their personal information may be compromised. So just what is the cost for thieves to obtain your personal data including banking information, personal health records and even your Facebook account …