Data Security Blog
Chain of Custody & Asset Inventory in IT Asset Disposition
The threat of data breach remains a constant and growing concern for all types of organizations. Today’s thieves are determined and vigilant, so proper data device destruction is crucial. Efficiently tracking chain of custody and asset inventory in IT asset disposition is a valuable way to safeguard your sensitive information. A chain of custody report…
Read More Is Hard Drive Shredding the Only Way to Ensure Data Security?
While some sing its praises, the physical destruction of the hard drive is not always the best solution for data security. That’s because the physical destruction of the hard drive is usually only best when the source is ready to be permanently decommissioned. More often than not, companies need to wipe data from drives that…
Read More Massive HIPAA Data Breach Response: Too Little, Too Late?
Community Health Systems, which runs 206 hospitals across the United States, recently announced that hackers had broken into its systems and stolen data on 4.5 million patients. The hackers had access to the patients’ names, addresses, birth dates and Social Security numbers, putting the patients at risk of identity theft. Thankfully, the hackers did not…
Read More