by Gary Scott | Dec 22, 2016 | News
Target Breach: 10 Facts (via InformationWeek) Mathew J. Schwartz Experts advise consumers not to panic as suspicion falls on point-of-sale terminals used to scan credit cards. Just in time for the holidays, Target confirmed Thursday that its systems were breached.... by Gary Scott | Dec 22, 2016 | News
MELVINDALE: Income tax, medical records dumped in bins behind church – thenewsherald.com. Police officers who recovered thousands of income tax returns and medical records from a paper recycling were unaware if there was a crime committed. The Gramm-Leach-Bliley Act... by Gary Scott | Dec 22, 2016 | News
Is securing physical computer hardware as important as cybersecurity? Every day news stories pop up about lax cybersecurity. Just look at the problems of Hillary Clinton and the Democratic National Committee, or the new movie about Edward Snowden. But the physical... by Gary Scott | Dec 22, 2016 | News
On-Site Hard Drive Destruction of Data Centers E-Waste Security, a NAID-Certified onsite hard drive destruction company, is introducing a specialized hard drive shredding truck to meet the needs of data centers located in downtown and urban areas. Data centers located... by Gary Scott | Dec 22, 2016 | News
If you’ve been searching for the most secure and cost-effective method of destroying your business’ information and digital media, you’ve no doubt come upon YouTube videos of digital media being crushed, smashed, axed and firebombed. Reminiscent of the old school used... by Gary Scott | Dec 22, 2016 | News
Servers, storage arrays, PC’s and laptops have an average life span of 3 years. How do you safeguard your information while donating or recycling your old computer? Answers to common questions about computer recycling and preventing ID theft: Will my computer hard...