Data Security
-
The Phantom of Shadow IT: Unseen Threats Lurking in Your Network
By: Clint Parsons, Director of Strategic Partnerships, SEAM Every business has its share of phantoms—the unseen, unmonitored devices and software that creep into your network under the radar. This phenomenon, known as Shadow IT, can be a silent killer, exposing your organization to major cybersecurity risks. Employees often introduce unauthorized devices, apps, or cloud services […]
read more -
A Practical Guide to NIST (SP 800-88r1) for Handling Decommissioned IT Equipment
By: Clint Parsons, Director of Strategic Partnerships, SEAM If your job involves managing retired computers, servers, or other IT equipment, you’ve probably come across the National Institute of Standards and Technology (NIST). NIST provides essential guidelines to help businesses securely remove data from these devices before they’re sold, recycled, or disposed of. One key document in […]
read more -
Back to School Tech Refresh: A Secure and Smooth Transition
By: Levi Hentges , Vice President / Development, SEAM Summer break offers a perfect window for schools to refresh their technology landscape. New devices arrive, promising to empower learning, while older equipment needs a secure farewell. This tech refresh process involves two crucial aspects: ensuring the security of new devices and responsibly managing the replaced […]
read more -
Summer Tech Tune-Up: Tips for Preparing Your North Dakota, South Dakota & Iowa School’s Tech for the Next Year
By: Levi Hentges , Vice President / Development, SEAM Summer break offers a much-needed respite for students and teachers alike. But for North Dakota, South Dakota, and Iowa school IT staff, it’s prime time to tackle that ever-growing to-do list and ensure your technology is ready to hit the ground running come fall. Check out […]
read more -
The Hidden Impact of Old Computers: Responsible Disposal for Businesses
While more urgent matters often take precedence, the fate of your old computers has a greater impact than you might think. Responsible disposal is crucial for protecting sensitive data and maximizing your return on investment (ROI). Certifications Make a Difference When selecting a disposal partner, certifications like R2, e-Stewards, and NAID are essential. These certifications […]
read more -
The Silent Threat of Hidden Data
In an age of advancing technology, hidden data within our devices has become a growing concern. While we’re mindful of the data that new technology might conceal, it’s equally vital to consider what’s hidden in plain sight. A recent encounter at SEAM Services shed light on this matter when a printer arrived with a forgotten […]
read more -
E-Waste 101: Reselling, Recycling, and Reusing Responsibly
In today’s rapidly evolving IT industry, the surge in electronic waste (e-waste) poses a significant concern. As businesses and consumers continuously upgrade devices and components, the decision on what to do with used equipment becomes paramount. Navigating these choices demands expertise, and that’s where an IT asset management company comes in to seamlessly guide you […]
read more -
Securing Patient Data: Lessons from Data Breaches for Dakota Healthcare Organizations
As healthcare organizations navigate the digital landscape, the recent HIPAA Journal report sends a clear signal: data breaches in healthcare are on the rise, and IT execs at Dakota hospitals need to take note. In 2023 alone, the Department of Health and Human Services (HHS) reported a staggering 725 large breaches, surpassing the previous year’s […]
read more -
Will My Company Be Held Accountable for a Data Breach?
Data breaches are one of the largest threats facing businesses today. Every year, millions of users of various services lose the personal information that they entrusted to businesses. These breaches can have serious consequences, especially when they concern financial information. If your business loses customer information that could be used for identity theft, you could […]
read more