Page not available in your preferred language
The branch that you searched for does not have a page in your preferred language. Would you like to visit the branch page on the #CODE# site?
Protect your business from an information breach with regularly scheduled paper shredding service.
Ensure sensitive data on old hard drives is 100% inaccessible by physically destroying the drive.
Boxes and filing cabinets stuffed with old documents? Get our one-time document destruction service.
Confidential information can be found on more than paper: we destroy CD-ROMs, USB drives, and data tapes.
Our convenient, easy to use, drop off document shredding is just around the corner.
From uniforms to identity cards, speciality shredding destroys information wherever it’s found.
Get a Quote
Back To Information Security Resources
With every passing year the traditional office continues to evolve, and so do business security issues. As we start a new year, now is the time to look at some of the latest business security trend predictions for 2012.
In this issue you will find suggestions on how you can do a better job at protecting your confidential information and reputation.
Download PDF Version
Hacking. Phishing. Worms. Malware. Botnets. Viruses. Cyberstalking. Identity Theft. Computer crimes are here to stay, and will continue to be a ‘growth industry’ for 2012 and beyond. Not only can businesses be impacted financially if attacked, but their brand image can suffer, consumer trust can diminish and they can be held liable for leaked data. The year 2012 may see a rise in high-profile hacking of businesses and government organizations along with spyware and malware mutations targeting smartphones and tablets.
With technology moving forward at breakneck speed, companies are constantly upgrading their computer hardware and devices and recycling, selling, donating or simply discarding hardware that is considered to be obsolete. Because of this trend, the proper disposal of aging and obsolete hardware is of both national and global concern. When hardware is not properly disposed of and confidential company/client information is left vulnerable to recovery, the company’s reputation is put in jeopardy, business bottom lines are at risk and inevitably IT professionals’ jobs are put in danger.
Businesses and IT managers need to know that erasing, reformatting, wiping and degaussing (or erasure) of electronics documents from a hard drive or a USB stick doesn’t mean information is gone forever – in the end corporate data can still be recovered. The only 100 per cent secure way to erase information is to safely and securely destroy the hardware/ media itself. The best way to ensure that no one can restore confidential data and essentially hack into private client and company information is to physically destroy any obsolete eMedia by crushing it, rendering such things as old hard drives, memory sticks and photocopier memories completely useless and beyond repair.
As imore companies move their private data into the cloud, security issues may arise namely around data privacy and security.
For data privacy, many countries have specific laws that say data on citizens must be held domestically. With cloud computing that data could reside anywhere and the customer might not have any idea where in a geographical sense that actually is.
On the security front, businesses are understandably concerned about the risks associated with corporate data being housed on the cloud. When control over data security is relinquished to a third party it can be difficult to ensure data is managed properly. It can also be a challenge to fully know who has access to the servers and if your company’s obsolete electronic data is being properly destroyed. It’s critical that business practices and risk management policies are not ignored when working with third-party vendors for cloud storage and database management requirements.
According to a recent study by the Ponemon Institute, only one-third of IT security and compliance executives surveyed think cloud infrastructure environments are as secure as on-premise data centres. Before considering cloud computing business leaders and IT managers need to ask tough questions and consider getting a security assessment from a neutral third party before committing to a cloud vendor.
The advent of new technologies is making it easier for employees to be located just about anywhere. In fact, according to a recent IDC study it is estimated that the worldwide mobile worker population will grow to 1.19 billion in 2013, accounting for 34.9 per cent of the workforce.
Unfortunately for IT professionals an increase in the mobile worker population means an increase in security threats. While devices like smartphones and tablets enable employees to access information on the go, these portable devices are also more susceptible to viruses or even worse they can fall into the wrong hands while workers are on the move, thus placing the company at risk of an electronic data breach. Furthermore, the concept of a paperless office (mobile or not) is not part of the reality of the working world. Mobile workers are still printing out confidential documents and may not necessarily be abiding by their company’s secure document destruction policies once these documents are no longer needed, putting the company at risk of a breach.
As the trend of an untethered office continues to grow, companies need to update and adapt both their electronic data and paper document security and destruction policies.
As best practices go, here are some protocols to consider for both online/electronic security and offline paper document security:
To protect the mobile worker from an electronic breach, practice the following:
To stop mobile workers from intentionally or unintentionally facilitating a paper document breach, practice the following:
By taking such steps and regularly reviewing security policies, organizations with a mobile workforce can protect themselves from the significant long-term impact of a data breach. If staff are not aware that there are policies and procedures in place, mistakes may occur, which could prove potentially fatal to the future of the business.
Shred-it has developed an online survey to help businesses better understand security gaps, conduct your own security self-assessment.
Learn more about Shred-it services or book your FREE security assessment.
You can also visit Shred-it on Linkedin, Facebook or follow us on Twitter.
Fill out the form or call 888-750-6450 to start protecting your business today!