BLOG

Could What Happened at Equifax Happen to You?

Equifax Data Breach In 2017, an employee at Equifax, the credit reporting agency, failed to convey a message to the company’s cybersecurity team. The Equifax website had security vulnerabilities and needed to be updated with a patch. But one person failed to act, and hackers quickly found their way into...
Continue Reading

Data Destruction Best Practices: 5 Policies to Adopt

If you knew for certain that thieves were roaming your neighborhood looking for unprotected houses, would you cross your fingers and hope that your home would be missed? Or would you take immediate steps to protect yourself and your family? Most of us would jump into action, keeping in mind...
Continue Reading

Comparing Onsite Shredding Vs. Offsite Shredding For Your Business

Customer information, financial documents, HR forms, proprietary files, medical records – if you wouldn’t want a data thief or the competition to see them, they’ve got to be shredded. Here in Massachusetts, state law actually requires that companies protect the personal information of state residents, so shredding certain documents might...
Continue Reading

Destruction and Drawback: How Importers Can Recoup Costs on Defective Goods

Hey, no one’s perfect. That’s a fact that anyone who works within the manufacturing space knows all too well. Human error, a drawback, and production failures happen all the time, which means that importers sometimes end up with huge shipments of products they can’t sell and can’t simply throw away. ...
Continue Reading

Heeding HIPAA: Destroying Health Information the Right Way

Running afoul of HIPAA can be a hugely expensive mistake. The Health Insurance Portability and Accountability Act was created in large part to protect patients’ rights to privacy, and violating HIPAA has ramifications beyond those of the typical workplace mistake. Committing a violation because of willful neglect carries a minimum...
Continue Reading

GDPR Compliance: How a New European Regulation Affects American Companies

As technology advances, the world shrinks. The Internet makes it incredibly easy for American companies to connect with European companies and customers. That can be great for business, but complying with regulations on both sides of the pond can get complicated – and a new piece of legislation out of...
Continue Reading

What’s in Your Data Security Policy?

When your company’s policies around PTO and travel reimbursements are solid, they can remain unchanged for years. Data security policies, on the other hand, require frequent updating. As technology advances, so do the strategies and scams used by data thieves. Creating and enforcing clear, comprehensive policies about security protects your...
Continue Reading

Long Distance Dangers: Protecting Company Data When Your Workers are Remote

Your dentist can’t perform a root canal remotely, and your handyman probably doesn’t offer telecommuting service. But, if you work in an industry that doesn’t require everyone to be on site all day, your organization probably has employees who work remote, at least occasionally. And if it doesn’t, it probably...
Continue Reading

Case Study: Secure Product Destruction of Off-Spec Products

At Northeast Data Destruction, we receive a variety of requests from companies looking to properly dispose of and destroy their data and products. When carrying out the destruction of products, companies oftentimes are not aware that there are rules and regulations set in place for this process with particular off-spec products....
Continue Reading

Protect Your Company’s Data This Year With These 5 Resolutions

The start of a new calendar year presents a prime opportunity to refresh your employees about company policies. And while it’s useful to give them updates about the dress code and how to log PTO, training employees to safeguard company data is a critical task. With the global average cost...
Continue Reading
1 6 7 8 9 10