TechR2

4 Ways Your IT Asset Disposal Vendor Can Save You Money

IT asset disposition can be a very time consuming and aggravating process. If not done correctly you risk significant costs (legal fees, fines, etc), environmental violations, and the risk of a data breach. As we have highlighted in other blogs, a solid decommissioning policy and disposition program is the first step in mitigating your risks. It is your IT asset disposal vendor that will make the difference when it comes to the execution phase. We will look at 4 ways that an IT asset disposal vendor can save you money on top of providing data security and compliance.

TechR2 is a Certified Woman Owned Business

Over 700 public and private sector individuals participated in establishing the Standards and Procedures of this rigid certification review. The goal of the certification program is to streamline the certification process and increase the ability of women business owners to compete for contracts at a national level.

“Certification provides a marketing opportunity for women business enterprises to participate in outreach programs, “says Lisa Rajaie- VP of Admin of TechR2. “In addition, this program will enable us to develop relationships with larger companies and create opportunities for future partnerships with public and private companies.”

Does Your Company Have the Same IT Security Lapses as the VA?

Later this month, the inspector general of the U.S. Department of Veterans Affairs will release a security audit that identifies the IT weaknesses of non-classified government agencies, according to Data Breach Today. Surprisingly, the audit confirmed cyberthreats to the VA from both domestic and international hosts.

However, an expert quoted in the article noted that the same lapses uncovered at the VA are also prevalent in the private sector, and blamed a lack of education for failure to commit to basic security measures.

The Simplest Way for you to Comply with Data Destruction Standards

Data destruction is tricky, and complying with industry standards and federal regulations can be a headache for business owners who have many aspects of business to manage.

The best way to ensure your compliance with ever-changing regulations and to keep your business safe from growing threats to data security is to implement a consistent solution that doesn’t require special skills. This way, every member of your team can be responsible for their own data security.

ISO 27001: What Does It Mean & Why is it Important?

ISO 27001: What Does It Mean & Why is it Important? [vc_row][vc_column width=”1/3″][vc_column_text] We’re proud to announce that TechR2 has received ISO 27001 Certification. We’re very excited about this step forward, but what does it all mean? [/vc_column_text][/vc_column][vc_column width=”1/3″][vc_column_text]The International Organization for Standardization (ISO) provides globally recognized management standards to the electronics recycling industry on […]

Compliance: Privacy Regulations Based on Industry

Compliance: Privacy Regulations Based on Industry [vc_row][vc_column width=”1/3″][vc_column_text]Protecting your brand and reputation is crucial to every organization as the number of data breaches is constantly on the rise. There are guidelines already in place for most organizations. Learn more about your industry’s regulations for data security. Do you accept payment via credit card? PCI, The […]

Outsource your IT without risking your data and device security

Outsource your IT without risking your data and device security [vc_row][vc_column width=”1/3″][vc_column_text]A 2013 Gartner report predicted the global IT outsourcing market to reach $288 billion, with Asia-Pacific, Latin America, and Great China markets expanding more than 13 percent. In a recent article, Bryan Britz, Research Vice President at Gartner, said, “Enterprise buyers pursuing hybrid IT […]

Lessons Learned at Business of Security Event

Lessons Learned at Business of Security Event Last week members of the TechR2 team had the opportunity to interact with a group of seasoned Information Security leaders at a Business of Security networking event. We had a great time learning from special guests: Cindi Hart, Kim L. Jones, Kent King, Larry Mead, Mike Scott, and […]

Retiring point of sale terminals? Protect your data.

Retiring point of sale terminals? Protect your data. We’ve all been to the grocery store, tried to sign the screen for our credit card purchase, and watched as our careful signature is rendered as an illegible scrawl. In-store credit card terminals and point of sale (POS) terminals don’t last forever. But what happens when they […]