News & Updates

  • What Exactly Is ITAD?

    What Exactly Is ITAD? Levi Hentges, Director of Business Development with SEAM When speaking with businesses in our community, I often hear: “I had no idea you guys existed!” This comes as no surprise. Most organizations only consider IT Asset Disposition, or ITAD, as an afterthought when they have to “get rid of stuff”. Computers, […]

    Read More
  • What’s the Difference Between NAID Certification & NAID Membership?

    When choosing a data destruction provider, it’s important to understand the differences between NAID/i-SIGMA members and NAID AAA certified vendors.  Although NAID membership is often confused with NAID AAA certification, they are VERY different. Who is NAID? Since 1994, the National Association for Information Destruction (NAID) has been the governing body for data destruction operations […]

    Read More
  • The Most Overlooked Part of Your Data Security

    One of the most critical areas of data security that often gets overlooked during this month of attention, is when your devices come off-line. Having a plan in place for securely getting rid of used equipment can instantly protect a company against the catastrophic risk of a data breach. Along with having a clearly defined […]

    Read More
  • What Should You Do with Legacy Devices After a Cloud Migration?

    Migrating to the cloud can be a significant decision for any business. It can involve changes in how your employees work and how you store and access your data. One thing that often gets overlooked when switching to the cloud is what to do with legacy devices. If you have devices that are no longer […]

    Read More
  • Employment Record Retention Guidelines: How Should Terminated Employee Files Be Purged?

    There is no one-size-fits-all answer as to when you should purge a former employee’s files and documentation since the laws and regulations governing the retention of employee records vary by jurisdiction. However, as a general rule, it is best to purge terminated employee files after a reasonable time has passed, and there is no longer […]

    Read More
  • Data Privacy vs. Data Security: An In-Depth Look at the Differences

    Data privacy and security have been a top priority for organizations of all sizes for a long time. May 25th, 2018, marked the day the General Data Protection Regulation (GDPR) was introduced in the European Union, setting a new universal standard for data privacy laws. California followed suit with the California Consumer Privacy Act (CCPA), […]

    Read More
  • Data Archiving: Why a Strategy Is Important and Where to Start When Creating One

    When it comes to data archiving, many businesses struggle with where to start. After all, there are so many different aspects of data that need to be considered. To make things easier, here’s a list of some of the most important considerations to keep in mind when creating a data archiving strategy. So whether you’re […]

    Read More
  • Why Companies Should Entrust a NAID AAA-Certified Company with Destroying Data

    When choosing a company to destroy sensitive data, you want to ensure you make the best decision possible. This is where NAID AAA certification comes in. What Does NAID AAA Certification Mean? The National Association for Information Destruction (NAID) is the leading international trade association for companies providing information destruction services. To become NAID AAA […]

    Read More
  • 4 Pieces of Equipment Containing Data that You May Be Leaving Unprotected

    Devices in your business contain sensitive data that can be left unprotected. If you don’t take the necessary precautions, cybercriminals could gain access to your information and harm your business, clients, and reputation. To assist you in keeping your data safe, we’ve compiled a list of 4 pieces of equipment containing data you may have […]

    Read More