Deleted Does Not Mean Destroyed

Today, a majority of business is conducted online or electronically. Bank transactions, payments, applications, emails, etc., are all a part of our normal day to day activities online. This information is stored and recorded on the hard drives of the machines we are using, a treasure trove of information for an identity thief. No problem, just delete the information before …

Small Office Shredder: Friend or Foe

Junk mail, receipts, business paperwork, credit card statements and healthcare information, the list is endless. Bottom line: it’s all paperwork that needs to be shredded. You know better than to discard personal information that could be used to commit identity theft in the garbage, but is tackling it with your small office shredder much better? When will you actually get …

DownStream Data Coverage – What Is It and Why Is It Important?

DownStream Data Coverage – what is it and why is it important?   Trusting your confidential information to a third party isn’t easy. You know how concerned you are about keeping your business and clients safe, but does your destruction vendor have that same level of vigilance?  What certifications do they carry?  How do they vet their employees?  Where does …

Vet your Vendors

When working with an information security provider, it’s important to do your homework. How much do you really know about the company handling your confidential material? You owe it to yourself, your clients and your employees to make sure you collaborate with accredited, trustworthy information security vendors. Here are a few things to remember when vetting a potential vendor: (information …