4 Steps to Protect Customer Information

More fallout for the country’s second-largest health insurer, Anthem, after the company announced a massive data breach in early February potentially affecting 80 million of its customers. In Nebraska alone, more than 100,000 affected residents are being notified of the breach via mail. Experts now say the cyber-attack could be far worse than previous breaches affecting retail and home improvement …

Trending: Plant-Based Document Destruction Popular Among Businesses

Confidential documents improperly disposed of led to over 30.4 million compromised documents in 2011 (FTC). That is 304,000,000 pieces of paper containing credit card numbers, social security numbers, addresses, names, phone numbers, and the like. To combat paper document leaks, organizations have been enlisting the services of document destruction companies, companies that provide safe and secure document shredding, both mobile …

Erasing Hard Drives not Effective Against Data Loss

Recent data indicates that over 340 million new computers are sold on an annual basis, 75% of which are replacements for older units. If you do the math, that is approximately 255,000,000 computers being replaced and retired every year. Most of these PC’s end up at recycling facilities or organizations that ‘promise’ to erase your personal information. These companies use …

Macy’s Parade Confetti Is Reason For Outsourcing Shredding

PHOENIX, ARIZONA – In response to the highly publicized use of shredded private information as confetti in the Macy’s Thanksgiving Day Parade, the National Association for Information Destruction (NAID) is reminding businesses that discarded shredded material is a security risk. “We’ve known for decades that shredded materials can be reconstructed,” said NAID CEO Robert Johnson. “Now, however, given the processing …

Why “Delete” Isn’t Enough

When you delete a file on your computer do you consider it gone? If you answered yes you are not alone. So many people today think that if they clear their computer history, delete files and cookies, and empty their recycle bins, they have done enough to protect themselves. While it is a good start it certainly is not enough …

Data Attacks

Have you ever considered how data is most commonly breached? Taking the time to understand how you are at risk may significantly reduce and perhaps eliminate a data breach in your future. The majority of information compromise comes from hacking followed by data either printed or electronic that is physically lost. The Identity Theft Resource Center (IRTC) found that card …

What’s In Your Trash Can?

Most of us refer to what we put in the garbage can as trash. Identity thieves have a markedly different definition. These less than above board individuals refer to the material in your garbage can as gleaming with possibility. What we throw away in the comfort of our own home or even in our place of business can be considered …

Don’t Be a Victim

Is your company’s data safe? Breaches of customer data today are growing in number. If you are a company who keeps records of your customers and handles credit cards, take caution. Breaches occur more often than you realize. A study by a data protection firm, Ponemon Institute, found that 85% of US organizations have experienced a data breach in 2009 …