IT Security & Data Destruction Blog

Digging deeper into data security

What is Reverse Polarity

What is Reverse Polarity
T-4 REVERSE POLARITY We know that data is stored magnetically on hard disk drives (see Figure 1 ) and that is why degaussing works. But sometimes a magnetic field in one direction may not be strong enough to degauss a high density hard disk and a reverse polarity field is necessary. The T-4 uses patented [...] Read More

How to Wipe Your Hard Drive

How to Wipe Your Hard Drive
How to Wipe a Hard Drive.   "Total data destruction and a throughly wiped hard drive, the first time, every time." Ryan Lobo   The idea that physically destroying a hard disk renders data secure is a common fallacy in the business world. Yes, if you shred, drill through or crush a hard disk, an [...] Read More

Data Visualization in 2018

Data Visualization in 2018

2018 Data Visualization Winners “Data visualization is a general term that describes any effort to help people understand the significance of data by placing it in a visual context. Patterns, trends and correlations that might go undetected in text-based data can be exposed and recognized easier with data visualization software.” Student = Shifting Gears: Visualizing Cycle […]

Read More

What to Do After A Data Leak: 5 Critical Steps

What to Do After A Data Leak: 5 Critical Steps

There were almost 1600 data breaches in the United States during 2017. Despite increased security measures, many businesses and organizations faced a situation where a data breach occurred. How you handle any data leak is important. Being prepared and taking immediate action can limit the damage caused by the incident as well as lower the […]

Read More

How to Select the Right Data Disposal System for Your Business

How to Select the Right Data Disposal System for Your Business

Did you know that over 40 percent of companies suffer a data breach each year? There are many different ways in which data theft occurs. However, one area that companies often overlook is proper data disposal. Effective data security requires both digital and physical destruction of media. There are several data disposal systems on the […]

Read More

What to Do After A Data Leak: 5 Critical Steps

What to Do After A Data Leak: 5 Critical Steps

What to Do After A Data Leak: 5 Critical Steps No matter how many security procedures you follow, a data leak can still happen. Make sure you’re prepared in the event of an emergency with our five key steps. There were almost 1600 data breaches in the United States during 2017. Despite increased security measures, […]

Read More
Call Now Button