Data Security Blog

Reclamere Achieves SOC 2 Type 2 Attestation, Strengthens Cybersecurity Team with Strategic Hire

Reclamere has successfully achieved SOC 2 Type 2 attestation, marking a significant milestone in the company’s continued commitment to structured, accountable cybersecurity practices. Unlike point-in-time certifications, SOC 2 Type 2 evaluates how effectively an organization’s controls operate over time. Validating not just that policies exist, but that they are consistently followed and enforced. For Reclamere,…
Read More

Are Your Employees Truly Prepared? What “Ready” Looks Like in Healthcare, Finance, and Education

Executive confidence in cybersecurity often centers on tools and policies. However, sector data continues to demonstrate that human behavior remains one of the most significant risk factors. 93% of healthcare organizations were attacked in the last 12 months. Nearly 3 in 4 reported disruptions in patient care. Yet 30% do not regularly train teams on…
Read More

Pennsylvania Cybersecurity Firm Reclamere Marks 25 Years by Advancing Duty of Care Risk Standards

Tyrone, PA (March 2026) – Pennsylvania-based cybersecurity firm Reclamere is celebrating 25 years in business by leading a critical shift in how organizations across the Commonwealth and nationwide approach cyber risk and accountability. Founded in 2001 in Central Pennsylvania, Reclamere has grown alongside the rapidly evolving cybersecurity landscape. What began as a data destruction and…
Read More

What Type of Data Is This? Teaching Employees to See PHI, PCI, and PII in Their Daily Work

Data classification is often treated as a technical or compliance exercise. Policies define categories such as Public, Internal, Confidential, and Restricted. Risk matrices are created. Systems are labeled. However, in practice, classification decisions are made by employees. When a staff member exports a spreadsheet, forwards an email, uploads a file to a collaboration platform, or…
Read More

Employees, Devices, and BYOD: Why Your Policies Aren’t Matching Today’s Risk

The modern attack surface did not expand in a dramatic moment. It expanded gradually and almost invisibly. It expanded when remote work became normalized. It expanded when personal smartphones began accessing regulated systems. It expanded when convenience quietly outpaced governance. In many regulated SMB environments, device policies evolved on paper while risk evolved in practice.…
Read More

Free Insider Threats eBook!

  • This field is for validation purposes and should be left unchanged.
Reclamere Information Lifecycle

NAID AAA Certification

Certified for:

Plant-Based Computer Media & SSD Destruction-Physical & Sanitization

Mobile Computer Media Destruction-Physical

Click to learn more about how we are indemnified by:

Click to learn more about our partnership:

Click to verify our protection from data security breaches & fraud:

Click to view our security score on SecurityScorecard:

Click to view our SOC 2 Type 1 Certificate of Completion:

Click to learn more about our membership:

Get Updates

"*" indicates required fields