The branch that you searched for does not have a page in your preferred language. Would you like to visit the branch page on the #CODE# site?
Protect your business from an information breach with regularly scheduled paper shredding service.
Boxes and filing cabinets stuffed with old documents? Get our one-time document destruction service.
Ensure sensitive data on old hard drives is 100% inaccessible by physically destroying the drive.
Confidential information can be found on more than paper: we destroy CD-ROMs, USB drives, and data tapes.
From uniforms to identity cards, speciality shredding destroys information wherever it’s found.
Get a Quote
March 15, 2018
Back To Blog
When it comes to the office, there are 4 key vulnerabilities you should be aware of. They are all very common mistakes.
Because people often leave their paper and confidential documents lying around here, a fraudster could quickly pick them up and walk off with this information. It is important for you to implement security codes at printers and ensure that all the documents are taken to your desk.
As for recycling bins, they are a threat to security because people can’t decide which information is confidential and often make the wrong judgment. Implement a Shred-it All Policy to take the guesswork out of what should and should not be shred and make sure ALL information remains secure.
The second vulnerability is hard drive storage. Most companies stockpile this information and then completely forget about it. It leaves them pretty vulnerable, especially if an expert hacker picks this stuff up, they can get all the company’s information. Please make sure that when your hard drives, e-media, and other data reaches the end of its life, it’s securely destroyed.
The third vulnerability is a messy desk. So many people are guilty of this – I know I am. Sticky notes, memos, and other documents. Somebody can just walk right in and know other information they’re not supposed to know. You should really consider a Clean Desk Policy which requires all employees to clear their desk if they are away for extended periods of time.
The fourth vulnerability is when people work from home. They take all kinds of confidential information and leave it in public places, coffee shops, their vehicles, or anything like that.
You should implement a comprehensive work from home policy which outlines how confidential documents should be handled outside of the office. They should also never be taken home if not necessary, but if they are, how to securely dispose of them after they’ve been used.
By addressing these four threats, you reduce the risk of becoming a victim of a data breach. And that is how Shred-it protects what matters.
To learn more about information security best practices, visit the Shred-it Resource Centre and follow us on Facebook, Twitter, and LinkedIn.
Fill out the form or call 888-750-6450 to start protecting your business today!