Data Security

  • COVID-19 Data Breach in South Dakota Under FBI Investigation

    Data breaches are nothing new, with companies large and small under attack across the U.S., and the world.  According to Norton, 2019 saw an estimated 3,800 data breaches disclosed, leaving over 4.1 billion records exposed.  Some of the largest breaches impacted financial institutions, entertainment outlets, government entities, and healthcare agencies, among other industries. In 2020, we’ve already […]

    read more
  • Are Your Data Destruction Practices Outdated?

    Chances are good that your North Dakota business already has some data destruction practices in place.  In this day and age, the threat of data breach is enough to make even small operations wary of going unprotected or letting sensitive consumer information fall into the wrong hands. As a result, you have probably adopted a […]

    read more
  • Prevent Fraud by Shredding Important Documents

    Fraud, a criminal act that includes the use of deception for personal gain, has become even more prevalent in the internet era, thanks to the proliferation of digital data.  This is why so many North Dakota and South Dakota companies have turned to measures like robust firewalls, anti-virus programs, password protection, encryption, VPNs, and more […]

    read more
  • Data Sanitization: It’s Not Just for End-of-Lifecycle

    As a responsible business owner, you understand that you can’t just toss unwanted IT assets in the trash when you’re done with them.  In addition to the environmental hazards this poses, dumping electronics that contain sensitive data can lead to nightmare scenarios like data breach and identity theft.  It also fails to comply with consumer […]

    read more
  • Proper Data Sanitization with NIST 800-88 Standards

    At some point, you’re going to find yourself in the position of having to purge IT assets.  This could happen when devices become outdated or damaged, when employees leave the company and you have to decide what to do with equipment and devices assigned to them, or when you decide to upgrade your infrastructure, for […]

    read more
  • Protecting Sensitive Data when Using Mobile Devices

    Mobile devices like smartphones, tablets, and laptops have added incredible convenience for businesses, allowing for ongoing operations even when employees travel or work remotely.  With non-stop connectivity, international operations are made easier, and instant communication greases the wheels of industry. Of course, the implementation of new technologies is not without drawbacks, and when it comes […]

    read more
  • The Many Business Risks of Bad Document Management

    Modern businesses tend to be fairly well-versed in the ins and outs of device management, planning out the life cycle of IT assets before they even purchase new equipment.  Part of this includes digital data management to ensure the security of confidential data. However, your South Dakota business may not assign the same level of […]

    read more
  • How is Hard Drive Destruction Different from Other Disposal Methods?

    Disposal of digital data has become a hot topic over the last couple of decades as South Dakota businesses have migrated to digital storage.  It remains a topic of conversation for the simple fact that technology continues to advance, creating new opportunities for hackers to steal confidential data.  In addition, people persist in believing that […]

    read more
  • What Should You Do with a Physically Damaged Hard Drive?

    Hard drives continue to improve, increasing data capacity even as they stay the same size or get smaller.  It wasn’t that long ago that a terabyte of storage was the size of a server.  Now you can get the same storage capacity in a thumb drive.  That said, these IT devices are not immune to […]

    read more