Deleted Does Not Mean Destroyed

Today, a majority of business is conducted online or electronically. Bank transactions, payments, applications, emails, etc., are all a part of our normal day to day activities online. This information is stored and recorded on the hard drives of the machines we’re using which can be a treasure trove of information for an identity thief. So you think, it’s no …

The Small Office Shredder: Friend or Foe?

Junk mail, receipts, business paperwork, credit card statements, and healthcare information—the list goes on and on. But the bottom line is it’s all paperwork that needs to be shredded. You know better than to discard personal information that could be used to commit identity theft in the trash, but is tackling it with your small office shredder really any better? …

DownStream Data Coverage—What Is It and Why Is It Important?

DownStream Data Coverage—what is it and why is it important?   Security with DownStream Data Coverage Trusting your confidential information to a third party isn’t easy. You know how concerned you are about keeping your business and clients safe, but does your data destruction vendor have that same level of vigilance? What certifications do they carry? How do they vet …

How Do You Vet Your Vendors?

When working with an information security provider, it’s important to do your homework. How much do you really know about the company handling your confidential material? What Do You Need to Know Before Choosing a Vendor? You owe it to yourself, your clients and your employees to make sure you collaborate with accredited, trustworthy information security vendors. Here are a …