Page not available in your preferred language
The branch that you searched for does not have a page in your preferred language. Would you like to visit the branch page on the #CODE# site?
Boxes and filing cabinets stuffed with old documents? Get our One Time Shredding Service.
New options available
Protect your business from an information breach with regularly scheduled paper shredding service.
Our convenient, easy to use, drop off document shredding is just around the corner.
Ensure sensitive data on old hard drives is 100% inaccessible by physically destroying the drive.
Private information can be found on more than paper: we destroy CD-ROMs, USB drives, and data tapes.
Paper shredding events designed to protect local communities from identity theft
Get a Quote
Back To Information Security Resources
In this issue we will discuss the common mistakes businesses should avoid making.
The first step in improving information security is conducting a thorough assessment of the vulnerabilities in your business. However, according to the 2014 Shred-it Information Security Tracker, one in five organizations in the United States have never audited their company’s protocols for storing and disposing of confidential information.1Take a close look at your organization’s current information security procedures so you can identify any potential mistakes and take concrete action to lower your risk.
Download PDF Version
Every year Americans lose billions of dollars to online, mail, door-to-door and telephone scams.2 This unique type of fraud can cause devastating damage to businesses. It’s important to stay informed so you can recognize these scams and protect confidential information.
Small businesses are often targeted by directory listing or unauthorized advertising fraud in an attempt to bill the organization for an advertisement or directory listing which does not exist. The organization is deceived by a fake quote based on a genuine entry or advertisement the business has had in a different publication or directory.
As a small business owner you can protect yourself by:
The first step in fixing a problem is knowing that it exists. In each edition we feature a recent high profile data breach to show businesses how they can mitigate similar risks.
This quarter we’re highlighting:
Book2Park.com: Book2Park.com is an online parking reservation service for airports across the United States. According to sources, they appear to be the latest victim of the cybercriminal group who stole more than a 100 million credit and debit cards from Target and Home Depot. Book2park.com is the third online parking service since December 2014 to fall victim to this group.
What you can do: Cybercrime continues to be one of the biggest threats to businesses, however according to the 4th Annual Shred-it Security Tracker, 57 per cent of American organizations reported having no cyber security policy in place. It is important for business leaders to ensure their information security protocols extend to include cyber security and the disposal of e-media and hard drives. Erasing hard drives does not mean data is destroyed. Physical hard drive destruction is proven to be the only 100% secure way to destroy data from hard drives.
Shred-it’s most important relationship is with its customers, which is why Shred-it Partners are trained to provide top level customer service and expertise. In each edition we highlight a Shred-it Partner that went above and beyond to provide exceptional customer service.
Celso Cantu, Customer Security Representative, Tampa, Florida
“Celso is not only professional, but also courteous when he services our account. He is never disruptive and everyone in the office loves him.”
For Celso Cantu being a Customer Security Representative means more than securely destroying documents, it means being dedicated to helping customers maintain their overall information security practices.
Celso demonstrates this commitment by being available on each customer visit to answer any questions they may have and always keeps an eye out for hard drives, CD’s or other old electronic devices that need to be destroyed. Before leaving his small business customers, Celso takes the time to touch base with each employee, helping them check their recycling bins to make sure they have no additional confidential documents which need to be destroyed.
Shred-it would like to commend Celso for going above and beyond for his customers by taking an active role in helping decrease their exposure to fraud.
Please visit the Shred-it Resource Centre for more information on successfully implementing an information security program in your organization. You can also stay informed with Shred-it on Facebook and LinkedIn or you can follow us on Twitter at @Shredit
Fill out the form below and we’ll contact you with a free quote within the hour! (Between 8:00am and 5:00pm, Mon - Fri)