By

Randy Miller
At Northeast Data Destruction, we receive a variety of requests from companies looking to properly dispose of and destroy their data and products. When carrying out the destruction of products, companies oftentimes are not aware that there are rules and regulations set in place for this process with particular off-spec products. One such situation recently occurred...
Continue Reading
The start of a new calendar year presents a prime opportunity to refresh your employees about company policies. And while it’s useful to give them updates about the dress code and how to log PTO, training employees to safeguard company data is a critical task. With the global average cost of a data breach at...
Continue Reading
If you don’t work in IT, take computers apart for fun, or even care about what happens inside your laptop, you may not realize that not all hard drives are created equal. Yes, they all store data — but they don’t all do it in the same way. Many computers use a type of drive...
Continue Reading
Could your business survive an attack by a data thief? Financial documents, employees’ Social Security numbers and bank account information, medical records, sensitive client files, proprietary designs — the results can be catastrophic if cybercriminals get their hands on your company’s data. When your company is done using anything that holds data, it’s essential that...
Continue Reading
You click delete, push back your desk chair and breathe a sigh of relief. Those not-needed emails were cluttering up your inbox and they’re finally gone. You can finally focus on more important work. But your mind wanders back to the emails you just deleted. After all, email deletion has been a hot topic in...
Continue Reading
Every company and household generates e-waste in the form of obsolete computers, monitors, printers, and peripherals. In fact, according to the StEP Initiative (“Solving the E-Waste Problem”, a partnership created by the United Nations organizations, government, non-government and science organizations), over 54 million tons of used electrical and electronics products were disposed of in 2014....
Continue Reading
There are basically two different ways to have your confidential files and documents shredded by an outside contractor. One option is having a shred truck visit your location, park at your facility and shred. This is “on site”. Each box of files you may have would need to be transferred to a shred bin. These...
Continue Reading
As society’s reliance on technology reaches new heights, keeping your business’s cyber security up to date is vital. Technology has become an all-encompassing part of our daily life; by living in reality, we are inadvertently immersing ourselves in the digital world. Sometimes, parts of ourselves that we do not want to be exposed also get...
Continue Reading
For anyone who is following data security, Verizon’s 2016 Data Breach Investigations Report serves as a comprehensive study into the risk human vulnerabilities and errors pose to companies’ data and security. In an interview with Bryan Sartin, managing director of the Verizon RISK Team and co-author of the Data Breach Investigations Report, he openly discussed...
Continue Reading
Commercial and industrial hazards can come in many forms. From auto accidents, to fires, weather and water damage, and more. If your office or warehouse suffers fire or water damage, your first thought is getting your employees back to work, and your business back in operation.  But, you should also consider risk of an improper...
Continue Reading
1 2 3