Hard Drive Destruction
How Do Shredding Trucks Differ From In-house Shredders?
How Do Mobile Shredding Trucks Differ From In-house Shredders? A brief look at the heart of our business: our mobile shredding trucks! So you’ve decided to contract with Legal Shred to help destroy your documents. Congratulations! You are taking an active part in protecting your identity by properly shredding your documents instead of tossing them…
Read MorePreparing For Your First Shredding Visit
Preparing For Your First Shredding Visit Ready for your first shredding visit? Here are a few tips to make your visit easier. Whether you’re a business or homeowner, chances are you probably have some papers that you can do away with. It’s a good habit to go through old documents that you no longer need,…
Read MoreThe Consequences of Improperly Destroying Data
The Consequences of Improperly Destroying Data Improperly destroying data or sensitive information presents the risk of identity theft. What are the consequences? Records management is an important aspect of running a tight ship, but storage and retrieval are only the tip of the iceberg when it comes to data management. Whether it’s paper or digital…
Read MoreIs Your Personal Information At Risk?
Is Your Personal Information At Risk? Identity theft protection might seem like a hassle, but remembering these simple tips can save you from a worst case scenario. With the advancement in technology, how we process and send information has never been easier. Our daily tasks now involve handheld devices, such as smartphones, tablets, and even…
Read MoreMoving – Legal Shred Can help!
Moving – Legal Shred Can Help! There is nothing like the prospect of moving to motivate a person to declutter. Whether you’re moving your family or your business, one thing is for certain: moving comes with some modicum of stress. Moving from one location to another is not only time consuming, but it can be…
Read MoreWhat Is a Data Breach Anyway?
Data breaches do not discriminate, but a few things are certain: they are destructive, they are expensive, and they can wreck a company and brand. A quick Web search of the term “data breach” will yield plenty of results, mostly headlines from around the globe about some big company being the victim of stolen data.…
Read MoreErasing, Degaussing, and Destroying Hard Drives, Which Method is Best?
Erasing, Degaussing, and Destroying Hard Drives, Which Method is Best? Your hard drive is a powerhouse of information. As we move towards a more digital society, computers are used to do and store more, which means that our devices are fountains of sensitive information. Security should always remain a top priority, specifically when it comes…
Read MoreWhere There’s Data Stored, There’s A Risk
Where There’s Data Stored, There’s A Risk Lee Howard 7/8/2007 – From casinos to hospitals, protecting personal records becomes as important as locking doors By Lee Howard Published on 7/8/2007 Businesses throughout the region that handle large amounts of personal information have found one sure-fire way of avoiding security breaches: collect less data. “We constantly…
Read MoreIDs stolen from junk computers
IDs stolen from junk computers John Millar, Special to the Free Press (London Fr 6/30/2005 – There’s an illicit market for personal information and many people are feeding it by failing to remove their identities from decommissioned computers. Website www.iaaca.com, says a June 22 International Herald Tribune story, ran an ad for available “dump” information.…
Read More