There’s a lot to lose when shredding your hard drives

Why would anyone choose to shred a perfectly good hard drive or SSD? Maybe you or your security department are concerned about the loss of data from drives when they are replaced or retired. But why not electronically sanitize the data and then reuse the drive? When companies choose to shred and destroy electronic media rather than sanitize the data, they also lose the opportunity to reuse these devices and gain value from these assets. This session will share case studies and research to justify the electronic sanitization and reuse of retired media assets.

Read more

ITAM Best Practices. The foundation for a successful cybersecurity program

Cybersecurity is one of the major concerns for any organization regardless its size. From on premises implementations to cloud based solutions ITAM plays a major role in knowing what the organization owns and user awareness. Now it is time to apply ITAM best practices to cybersecurity program to ensure any cybersecurity program is implemented with a solid foundation.

Read more

Overlooked Data Breach Risks: The New Age of Hardware Hacking

Today, data is now stored on devices not traditionally considered “hackable.” Due to technological advances, many organizations are now faced with major issues pertaining to their electronics for fear that their private or personal data will be compromised. As a result, the recycling of e-waste has indeed become an issue that transcends environmental responsibility, moved into the realm of privacy protection and hardware hacking prevention. This talk will cover the broad array of technology that now contains data and what to expect on the horizon…and what next steps should be in the worlds of ITAD and e-waste recycling.

Read more