BLOG

What FERPA means to data destruction

Educational institutions need to have the proper equipment and training in place to guarantee full… Read More

Erasing data from IoT smart devices

The computer is no longer the only common workplace device that stores data. Read More

3 data sanitization methods from the DoD, NSA

Data sanitization, though simple on the surface, actually presents a variety of wrinkles and nuances… Read More

Looking at data destruction through the lens of security best practices

The process of destroying a hard drive is often considered only when organizations are working… Read More

Why overwriting is not enough to erase data

Rewriting your data, even rewriting it several times, is not a completely secure solution. Read More

Why Companies Must Comply With Data Disposal Regulations

Companies that don't comply with regulations designed to protect data are taking a number of… Read More

How A Shredder Can Help Say Goodbye To A Smartphone

Fall is magical, especially for smartphone device manufacturers. Read More

Why Data Destruction Should Be Treated With Respect

Anybody who is aware of the work of the late Terry Pratchett will know that… Read More

Erase, encrypt, degauss and destroy – How to avoid single points of failure

If there is one universal truth in the cybersecurity world, it is that organizations should… Read More

SSD destruction hinges on encryption and shredding

The time has come for businesses to seriously evaluate how they will prepare for solid… Read More