Data Security

  • Data Destruction 101: Deleting Doesn’t Count

    The advent of digital data has literally changed the way we live, enhancing our ability to access and share information.  It has put the world at our fingertips.  For businesses, the incredible growth of IT over the last few decades has allowed for greater speed, efficiency, and reach, creating endless opportunities for growth, productivity, and […]

    read more
  • Planning for ITAD Program Success

    Companies tend to spend a lot of time considering IT upgrades.  When you’re shelling out a ton of dough for new computer equipment, servers, or mobile devices, you want to be sure you’re making a wise investment that will serve your needs and pay off in use value for years to come. Unfortunately, you may […]

    read more
  • IT Asset Disposal Myths

    By now, everyone knows that tossing IT assets or outdated paper records in the trash is a big no-no.  If thieves access sensitive data, you could suffer a data breach and consumers could become victims of identity theft, all of which is terrible for your customers and your company. The best way to protect confidential […]

    read more
  • COVID-19 Data Breach in South Dakota Under FBI Investigation

    Data breaches are nothing new, with companies large and small under attack across the U.S., and the world.  According to Norton, 2019 saw an estimated 3,800 data breaches disclosed, leaving over 4.1 billion records exposed.  Some of the largest breaches impacted financial institutions, entertainment outlets, government entities, and healthcare agencies, among other industries. In 2020, we’ve already […]

    read more
  • Are Your Data Destruction Practices Outdated?

    Chances are good that your North Dakota business already has some data destruction practices in place.  In this day and age, the threat of data breach is enough to make even small operations wary of going unprotected or letting sensitive consumer information fall into the wrong hands. As a result, you have probably adopted a […]

    read more
  • Prevent Fraud by Shredding Important Documents

    Fraud, a criminal act that includes the use of deception for personal gain, has become even more prevalent in the internet era, thanks to the proliferation of digital data.  This is why so many North Dakota and South Dakota companies have turned to measures like robust firewalls, anti-virus programs, password protection, encryption, VPNs, and more […]

    read more
  • Data Sanitization: It’s Not Just for End-of-Lifecycle

    As a responsible business owner, you understand that you can’t just toss unwanted IT assets in the trash when you’re done with them.  In addition to the environmental hazards this poses, dumping electronics that contain sensitive data can lead to nightmare scenarios like data breach and identity theft.  It also fails to comply with consumer […]

    read more
  • Proper Data Sanitization with NIST 800-88 Standards

    At some point, you’re going to find yourself in the position of having to purge IT assets.  This could happen when devices become outdated or damaged, when employees leave the company and you have to decide what to do with equipment and devices assigned to them, or when you decide to upgrade your infrastructure, for […]

    read more
  • Protecting Sensitive Data when Using Mobile Devices

    Mobile devices like smartphones, tablets, and laptops have added incredible convenience for businesses, allowing for ongoing operations even when employees travel or work remotely.  With non-stop connectivity, international operations are made easier, and instant communication greases the wheels of industry. Of course, the implementation of new technologies is not without drawbacks, and when it comes […]

    read more