Data Security

  • Security Threats: Through the Back Door

    When technology expires it’s easy to shut down the device and think the risk is gone. The reality is, a new type of threat begins: Physical Security. Securing equipment against physical intruders seems like one of the easiest ways to protect company data. However, it’s usually one of the most overlooked steps at the disposal […]

    read more
  • Hard Drive Wiping: Good Enough?

    When hard drives are ready for disposal, businesses need to have a proven data destruction plan that is safe, efficient, and, most importantly, effective. Many companies wonder if hard drive wiping is really “good enough” when it comes to data destruction. This is a fair question. With data-recovery technology more advanced than ever before, companies […]

    read more
  • Control Through the End

    If IT equipment is not controlled, it can easily put you out of business. From the point of purchase all the way through the end of life recycling or resale, data-bearing assets need to be tightly controlled to prevent them from falling into the wrong hands. A proper IT Asset Management plan should include complete procedures […]

    read more
  • Is My Data is Safe?

    How do I know if my data is truly safe when I recycle my computer? This question is a very important one to ask when you recycle your computer or any data-bearing electronic device. Often times, people do not do their research on the electronics recycling process where they are bringing their old electronics and […]

    read more
  • Decommissioning in the Workplace — FREE WHITEPAPER

    With data breaches on the rise, securely and effectively decommissioning your company’s IT assets at the end of their lifecycle is essential. For IT Professionals in the Sioux Falls area, especially those in the finance or healthcare industries, a well implemented plan can prevent unauthorized access and create an audit trail for compliance with the […]

    read more
  • How to Secure End of Life Equipment

    Security risks do not go away when you turn off the computer. Even if you think there is no sensitive data on a device or hard drive, are you willing to bet your business on that? To prevent severe financial, legal and reputational consequences, your business must protect your electronic devices when they come off the […]

    read more
  • How to Plan for IT Equipment Decommissioning

    All computer equipment becomes outdated at some point in its life-cycle. Planning ahead for the decommissioning, replacement and re-marketing of your obsolete IT assets is a necessary step to avoid unexpected risks. When you are approaching this phase in your IT asset management (ITAM) process, it’s time to make a plan for IT Asset Disposition […]

    read more
  • Every Bank Needs This Checklist

    Financial institutions face daily challenges when it comes to compliance, protecting customer data, and managing third-party risks. With a heavy focus on internal security, the risk of equipment leaving the premises for recovery, recycling or disposition is often an after thought. Complying with Regulations Under regulations such as the Gramm-Leach-Bliley Act (GLBA) and the Sarbanes-Oxley […]

    read more
  • Computer Resale and Recycling: What are the Risks?

    The rapid evolution and constant use of technology has many organizations on a frequent refresh cycle, leaving them overloaded with unused technology equipment. When choosing to recycle or sell your computer equipment, it’s important to define your specific needs related to the removal, movement and disposition of your electronic assets, as well as uncover any […]

    read more