Archive for June 2018
ICYMI: Certificates of Destruction, Compromising Work Habits, and Visual Hacking
Keep Your Mobile Device Safe With These Data Security Tips
Why you need to secure your mobile device and how to best protect your information. Smartphones and mobile devices are a one-stop payment, personal health, work, gaming, productivity, texting, and social media-using machine. We use them to do just about everything, from mobile banking to navigating new places, to emailing out last-minute notes on a…Read More
Visual Hacking: What It Is and How to Prevent It
Visual hacking is a security threat that is often overlooked. This is the act of stealing information by simple observation and it’s success rates are as high as 90%. Here’s what you need to know. Perhaps you lock up your files, keep your digital data under lock and key, and authenticate users around your office…Read More
Are These Work Habits Compromising Your Company’s Security?
You may be more susceptible to a data breach if you or your employees have any of these work habits. A data breach can be your worst nightmare. Not only could it be disastrous for your company’s brand, it could lead to significant revenue losses and regulatory fines. While you may take digital data security…Read More
Certificate of Destruction: Do You Really Need One?
A certificate of destruction is a formal statement that summarizes the steps that were taken by the shredding company in the disposal of your documents. Here’s why that’s important. In an effort to adhere to compliance standards and document destruction laws, businesses and residential customers often need assistance from a professional document destruction company. By…Read More