Vet Shredding Service: Six Questions to Ask

An increasing number of sophisticated cyber attacks in the past year has corporations and Internet security experts on high alert. But information security goes beyond phishing schemes, malware or hackers stealing valuable information from the wired world. Less refined data breaches play out in the work place every day with equally devastating results. Stolen laptops with access to customer information, work …

Is The Data Storage In Your Smartphone a Window into Your Life?

It seems as though every few months our smart phones are getting smarter and smarter. The ability to provide immediate information, an instant connection, or even mobile banking has provided a convenience that leaves us wondering how we ever managed without it. Though the technology is ever advancing and making our lives innumerably better, the abundance of information in a …

Trending: Plant-Based Document Destruction Popular Among Businesses

Confidential documents improperly disposed of led to over 30.4 million compromised documents in 2011 (FTC). That is 304,000,000 pieces of paper containing credit card numbers, social security numbers, addresses, names, phone numbers, and the like. To combat paper document leaks, organizations have been enlisting the services of document destruction companies, companies that provide safe and secure document shredding, both mobile …

Macy’s Parade Confetti Is Reason For Outsourcing Shredding

PHOENIX, ARIZONA – In response to the highly publicized use of shredded private information as confetti in the Macy’s Thanksgiving Day Parade, the National Association for Information Destruction (NAID) is reminding businesses that discarded shredded material is a security risk. “We’ve known for decades that shredded materials can be reconstructed,” said NAID CEO Robert Johnson. “Now, however, given the processing …

Data Attacks

Have you ever considered how data is most commonly breached? Taking the time to understand how you are at risk may significantly reduce and perhaps eliminate a data breach in your future. The majority of information compromise comes from hacking followed by data either printed or electronic that is physically lost. The Identity Theft Resource Center (IRTC) found that card …