Data Security Blog

Chain of Custody & Asset Inventory in IT Asset Disposition

The threat of data breach remains a constant and growing concern for all types of organizations. Today’s thieves are determined and vigilant, so proper data device destruction is crucial. Efficiently tracking chain of custody and asset inventory in IT asset disposition is a valuable way to safeguard your sensitive information. A chain of custody report…
Read More

Is Hard Drive Shredding the Only Way to Ensure Data Security?

While some sing its praises, the physical destruction of the hard drive is not always the best solution for data security. That’s because the physical destruction of the hard drive is usually only best when the source is ready to be permanently decommissioned. More often than not, companies need to wipe data from drives that…
Read More

Massive HIPAA Data Breach Response: Too Little, Too Late?

Community Health Systems, which runs 206 hospitals across the United States, recently announced that hackers had broken into its systems and stolen data on 4.5 million patients. The hackers had access to the patients’ names, addresses, birth dates and Social Security numbers, putting the patients at risk of identity theft. Thankfully, the hackers did not…
Read More

Free Insider Threats eBook!

Reclamere Information Lifecycle

NAID AAA Certification

Certified for:

Plant-Based Computer Media & SSD Destruction-Physical & Sanitization

Mobile Computer Media Destruction-Physical

Learn more about our:

Get Updates