Compliance

  • How and Why You Need to Create a Remote Work Policy for Your Business

    The remote workforce is growing in leaps and bounds.  Many workers enjoy the luxury of working from home, managing their own time, and avoiding a lengthy daily commute.  Employers who use a remote workforce can reduce the expense of office space and utilize contract workers instead of adding to their overhead with the salaries and […]

    read more
  • HIPAA ALERT: HHS Issued Guidelines on e-Device Disposal

    The United States Department of Health and Human Services (HHS) recently issued guidance on how to properly dispose of electronic devices to prevent data breaches. Healthcare organizations are prime targets for data breaches. Often times, detailed security plans are put in place to protect networks from online vulnerabilities, but they fail to cover offline equipment with […]

    read more
  • Risk Mitigation for Data Asset Destruction

    There are known risks to storing data in digital formats.  If your firewall isn’t robust, your password protections are weak, you’ve decided to forego encryption, and so on, you place yourself at risk of data breach, identity theft, and damage to your customers and your company. What you might not realize is all the risks […]

    read more
  • Using a Hard Drive Shredder: 4 Common Mistakes to Avoid

    The migration to digital data is still underway, but by now, most businesses prefer the convenience and space-saving benefits of storing data on hard drives rather than keeping filing cabinets and storage warehouses full of paper records.  The caveat, of course, is that business owners have to take steps to keep digital data safe. In […]

    read more
  • New Data Breach Law in South Dakota

    As of this month, every state in the U.S. now has a data breach notification law. Just yesterday, South Dakota‘s first ever data breach notification law went into effect (July first). What do South Dakota Businesses Need to Know (The Takeaways) Personal Information and Protected Information Defined: “Personal Information” consists of a person’s first name or first […]

    read more
  • Windows 7 to Become Obsolete by the End of 2018: Time for a Hardware Refresh

    Turnover in technology is nothing new.  Ever since the beginning of the industrial revolution, technological advances seem to occur at an ever-quickening pace, as evidenced by the rapid innovations in computing, mobile, and internet technologies over the last few decades.  It’s hard to believe that the iPhone debuted just over a decade ago, forever changing […]

    read more
  • Business eWaste…Are you in Compliance?

    Home Depot may be one of the most recent companies to make the news for illegally dumping its electronic waste — resulting in a $27 million settlement with their state — but they are certainly not alone when it comes to this careless and unlawful way of getting rid of used computers and equipment. In […]

    read more
  • What Your Business Should Know about GDPR

    There is no shortage of rules and regulations to observe when it comes to data protection. Businesses that want to stay on the right side of the law (and their customers) must comply with federal, state, and local privacy laws, as well as any applicable industry regulations geared toward protecting specific confidential information (such as […]

    read more
  • The Importance of Electronics Recycling

    Although federal and state laws are a little slow on the uptake when it comes to regulating e-waste, responsible businesses, institutions and individuals are jumping on the eco-friendly bandwagon when it comes to recycling their old computers and electronic devices rather than sending them to the landfill. As an organization utilizing advanced technologies, you’re no […]

    read more