According to Ponemon Institute, considered the pre-eminent research center dedicated to privacy, data protection and information security policy, “…research reveals that reputation and the loss of customer loyalty does the most damage to the bottom line. In the aftermath of a breach, companies find they must spend heavily to regain their brand image and acquire new customers. Our report also shows
TechR2 is a Global Leader in Comprehensive Onsite IT Asset Retirement Solutions Including Onsite Data Destruction and Recycling.
Is your Enterprise Protected?
It’s no secret that Data breaches are a threat to all organizations. Don’t let your organization become a part of these statistics. Allow TechR2 to assist in mitigating your risk of a data breach that would lead to significant fines, litigation and most of all – harm to your reputation and brand.
Guidelines for Compliance &
Industry Best Practices
TechR2 takes an aggressive role in honoring our environment in everything that we do. We ensure that standards are in place and our business associates are aware of the different requirements and regulations specific to their industry.
As the world of technology is evolving and IT rules are changing, the security risks are increasing. TechR2 provides consulting and recommendations on upcoming trends and challenges that our clients are faced with daily.
TechR2 partners with many organizations to reduce their exposure and risk by providing secure onsite data destruction solutions and end-of-life disposal options.
We are ISO 9001:2008, ISO 14001:2004, ISO 27001:2005, OHSAS 18001:2007, WBE, WOSB and R2:2008 certified.
Industry News, Facts, Articles
Many companies and IT professionals worry about hackers and unsecured networks. But we know that "loose media" (disc drives, flash drives, retired computers, server media and other storage devices) are often discarded or recycled without regard to the danger. Employee theft of sensitive data Some companies believe that, so long as the hard drives, discs and other media remain inside [...]
I have come across several articles over the past month or so that have talked about risk mitigation. This isn't uncommon, but there was a recurring theme that I had to address. There has been confusion recently as to who holds more responsibility, the service provider or the company who created the data? The company will always have some level [...]
What happens to these retired assets and the confidential data that is left behind? In a perfect world all of the data is properly destroyed and the assets are either retired or resold. Companies are now transitioning to cloud based services and newer technology as a way to lower their costs in the long run, and the work required to [...]
Target and other retailer data breaches in 2013 have started conversations regarding credit card security and data breach notification legislation, and those conversations are continuing. Since the end of last year merchants have been quick to try and upgrade their current payment processing systems and bolster their network security. At the same time data security companies, lawmakers and payment processors all started to [...]
Data breaches have been a popular topic of conversation already this year, much of this stemming from the large breaches that occurred at the end of last year. But going into 2014 we are continuing to hear more and more about data breaches. I am not sure if this is a product of the recent awareness of them, or due to
“IT Hardware Recycling Remains an Orphaned Function in Most Enterprises”- International Data Corporation (press release 9/13/12) Who is responsible? IT, Security, Procurement, Legal, Business Unit Manager, Human Resources, Other? In a new multi-client study from IDC, “IT Asset Disposal and Recycling; U.S. Enterprise Practices and Outlook 2012-2013” finds that more than 1/3rd of companies recently surveyed do not use proper