News & Updates

Year: 2019

  • Which Data Destruction Method is the Most Secure: Data Erasure or Drive Destruction?

    IT asset disposition, or ITAD, is just the end of the long process of IT asset management (ITAM).  That said, it is no less important than protecting data while it’s in use.  This means you must take the time to understand data destruction options so you can remain in compliance with applicable consumer privacy and […]

    read more
  • The BYOD Policy is Becoming More Popular, But Does it Pose a Security Threat?

    Modern offices tend to adopt a more relaxed work environment, one in which the walls of cubicles have come down in favor of open-concept floor plans and employees are encouraged to participate in a team-driven environment.  Of course, policies and procedures have not become so lax as to allow for a BYOB mentality.  As for […]

    read more
  • How You Can Save Money in Your Data Center with Data Erasure

    For years, one of the difficulties for businesses storing data was the ever-growing volume of hard copies and where to put them.  Entire rooms full of filing cabinets were devoted to organized storage of files and overflow went to secure warehouses for storage. In addition to cost, potential downsides included risk of physical theft as […]

    read more
  • How Secure is SSD Encryption Really?

    When your South Dakota company spends money to upgrade hardware, there are several priorities;  It has to meet your needs now and in the foreseeable future, it has to integrate with current operating systems, and of course it must be secure. When it comes to solid-state drives (SSDs) that store data, security is of the […]

    read more
  • How Effective is Shredding Drives Internally?

    People used to destroy their hard drives by pounding nails through the disc or dipping them into acid baths.  Unfortunately, these tactics were neither safe nor particularly effective.  Thankfully, most businesses have realized there are more efficient ways to destroy data, and they don’t involve nails or acid baths. Today, you can either wipe data […]

    read more
  • Managing Sensitive Information on Mobile Devices

    More and more business these days is conducted remotely, from home or on the go, using a variety of mobile devices, including cell phones and tablets.  These tools allow your North Dakota business to proceed even when employees travel, take sick days, or simply work from home to avoid a long commute. Are cell phones […]

    read more
  • Why Environmentally-Friendly ITAD is So Important

    In this day and age, there’s no shortage of environmental concerns, from carbon emissions to plastics conglomerating in the ocean and killing marine life, among other things.  While some companies can take steps to reduce contributions to these problems, there is one environmental issue that every modern company must address: e-waste. The turnover in electronics […]

    read more
  • What IT Assets Can Your Business Recycle?

    The first thing you need to know about responsible e-waste disposal is that you should recycle any and all electronics.  Unfortunately, electronic devices, and especially computer equipment and devices, are often full of your private information you need to protect and laden with toxins that could prove harmful if they escape into the environment, say […]

    read more
  • Do You Need a Hardware Asset Management Plan?

    Your ITAM, or IT asset management strategy is an essential part of spending wisely and getting the greatest use value from pricey IT equipment and devices.  A failure to plan could result in wasteful and negligent practices that cost you unnecessary funds and put your company and your customers at risk. There’s no question that […]

    read more