Private: Target Data Breach

Target Breach: 10 Facts (via InformationWeek) Mathew J. Schwartz Experts advise consumers not to panic as suspicion falls on point-of-sale terminals used to scan credit cards. Just in time for the holidays, Target confirmed Thursday that its systems were breached....

Police Unaware That Dumping Medical Records Is A Crime

MELVINDALE: Income tax, medical records dumped in bins behind church – thenewsherald.com. Police officers who recovered thousands of income tax returns and medical records from a paper recycling were unaware if there was a crime committed. The Gramm-Leach-Bliley Act...

Computer Hardware Security For HIPPA Compliance

Is securing physical computer hardware as important as cybersecurity? Every day news stories pop up about lax cybersecurity. Just look at the problems of Hillary Clinton and the Democratic National Committee, or the new movie about Edward Snowden. But the physical...

Onsite Hard Drive Destruction for Data Centers

On-Site Hard Drive Destruction of Data Centers E-Waste Security, a NAID-Certified onsite hard drive destruction company, is introducing a specialized hard drive shredding truck to meet the needs of data centers located in downtown and urban areas. Data centers located...

Digital Media Destruction – The Four Critical Questions

If you’ve been searching for the most secure and cost-effective method of destroying your business’ information and digital media, you’ve no doubt come upon YouTube videos of digital media being crushed, smashed, axed and firebombed. Reminiscent of the old school used...

Preventing ID Theft When Recycling or Donating a Computer

Servers, storage arrays, PC’s and laptops have an average life span of 3 years. How do you safeguard your information while donating or recycling your old computer? Answers to common questions about computer recycling and preventing ID theft: Will my computer hard...