Compliance

  • How to Simplify Your Information Disposal Practices

    Over time, as you learn to run your business, your policies and procedures may change to better suit your needs. Unfortunately, this often results in added steps that don’t necessarily increase efficiency. If you’ve noticed that your information disposal practices seem to result in frequent errors, it may be time to reevaluate your processes and […]

    read more
  • Lessons from 2018 Healthcare Data Breaches

    Healthcare was hit hard in 2018, with a 158% year-over-year increase in the number of records compromised compared to 2017, and it doesn’t look to be slowing down anytime soon. In 2019, healthcare organizations have already experienced more than one data breach per day in January alone. The largest cause of the breaches was hacking, while other factors like unauthorized […]

    read more
  • How Hard Drive Shredding Can Help You Remain Compliant

    There are all kinds of laws to govern how business is conducted.  There are laws designed to protect the environment, employees, and of course, consumers.  Along those lines, your business will have to comply with a variety of privacy laws meant to protect sensitive consumer data and prevent identity theft. There are privacy laws at […]

    read more
  • Quick IT Liquidation Tips for Businesses

    Every business is going to face situations in which some amount of liquidation is necessary.  Maintaining steady cash flow is an essential component in running a successful operation.  While a lot can be done on credit these days, you still need to keep the lights on, so to speak.  At the very least, you have […]

    read more
  • Essential Components of Your ITAD Solution

    IT asset disposition, or ITAD, is a crucial part of any company’s digital security plan.  Unfortunately, many businesses don’t give ITAD the same attention as setting up digital data protections like firewalls, antivirus programs, encryption, monitoring, and so on.  While it is important to keep current, usable data safe, it doesn’t eliminate the need to […]

    read more
  • Electronic Data Destruction and the Chain of Custody

    When you decide to upgrade to new hardware and get rid of outdated computer equipment, it is essential that you do so in keeping with all applicable environmental and privacy laws, so as to protect yourself, your clients, and the environment.  This means developing policies and working with partners that create a clear chain of […]

    read more
  • How and Why You Need to Create a Remote Work Policy for Your Business

    The remote workforce is growing in leaps and bounds.  Many workers enjoy the luxury of working from home, managing their own time, and avoiding a lengthy daily commute.  Employers who use a remote workforce can reduce the expense of office space and utilize contract workers instead of adding to their overhead with the salaries and […]

    read more
  • HIPAA ALERT: HHS Issued Guidelines on e-Device Disposal

    The United States Department of Health and Human Services (HHS) recently issued guidance on how to properly dispose of electronic devices to prevent data breaches. Healthcare organizations are prime targets for data breaches. Often times, detailed security plans are put in place to protect networks from online vulnerabilities, but they fail to cover offline equipment with […]

    read more
  • Risk Mitigation for Data Asset Destruction

    There are known risks to storing data in digital formats.  If your firewall isn’t robust, your password protections are weak, you’ve decided to forego encryption, and so on, you place yourself at risk of data breach, identity theft, and damage to your customers and your company. What you might not realize is all the risks […]

    read more