TechR2

Efficient Tear-A-Byte® Method Saves Money

All processes in a data center and within the enterprise have direct and indirect costs. Managers know what the direct costs are because they are budgeted and invoiced regularly. The indirect expenses spring up when a process is not completed correctly. Most business professionals know that it is rare for everything in a project to be executed without any issues. At TechR2, we encounter this issue with many clients – so we’ve become experts in solving problems and more importantly, solving problems while staying within budget.

TechBox™ for Enterprise

The TechR2 TechBox™ is a lockable, efficient, and cost effective solution for your IT asset disposal needs. The flat rate cost includes shipping, processing of IT assets, a detailed audit report and Certificate of Destruction. We follow the ISO 14001 Environmental Health and Safety Systems. We honor a zero landfill policy and take pride in our role in honoring the environment.

The 3 Mistakes that Led to Your Data Breach

Let’s get right to the point: in today’s world, we must track, contain and destroy the data-bearing devices when they reach the end of the life or use in order to prevent your data being compromised.

The 2-Person Security Rule Should Be Common Sense

In a data center, there are two types of systems, those that are working and can be managed by the storage manager software written by companies like IBM and EMC. Then there are the systems that are being decommissioned or containing data bearing devices that no longer function.

TechR2 RFID Tags Will Enable Full Verification of Any Disk Drive Destruction

The tracking of removable or portable media has become critical due to the large amount of sensitive, confidential, personal and identifiable information contained in any such media.

Loss and theft ranks high as the primary means by which sensitive data is inadvertently disclosed to sources of ill will. In the case of portable media, any kind of information release could occur while storage hardware is taken off-line and / or retired without proper erasure. In some cases, attempted conventional means to overwrite data on drives not conducted by credible and certified means can lead to improper overwrite of all sectors on the drive.

Data Destruction Myths

An IT Manager was heard to say recently “the hard drive is inoperable so let’s just send it to offsite recycling”. Another data center manager chimes in and adds, they “beat their units up with hammers and send them to the recycler”. An R2 recycling manager smiled and said “the last time I was at the recycler’s facility, I saw many people picking through the piles of e-waste and selecting all of the units that were not destroyed and purchasing them for a miniscule amount of cash.

Data breaches from lost or stolen media are the #1 source of large-scale data compromises.

Data breaches from lost or stolen media are the #1 source of large-scale data compromises.

  • The #1 cause of large-scale data breaches is loss of data-bearing media (disk, tape, USB drives, CD/DVD) during transport or from data centers.
  • Many organizations lack adequate controls to track, secure and destroy data-bearing devices.
  • Compliance with new Federal Standard for Data Destruction NIST 800-88 requires companies to review and upgrade their information security practices.

TechR 1-2-3

It is highly probable that your hard drives will be, at some point, obtained by unauthorized individuals. What are you doing to protect the intellectual property and data that is your responsibility?

Data Storage Device Stolen from Lloyds Bank

Data Storage Device Stolen from Lloyds Bank Sept. 14, 2015. A data storage device was recently stolen from a Lloyds’ Bank data center two months ago containing personal data including customer names, addresses, and account numbers for Lloyds’ Premier Account customers. Read More [vc_row type=”grid” row_type=”section” bg_image_repeat=”repeat” padding_top=”24″ padding_bottom=”24″][vc_column dp_animation=””][vc_separator][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-left”][/vc_column][vc_column […]

DS Recap, August 14, 2015

[vc_row type=”grid” video_bg=””][vc_column dp_animation=””][vc_column_text dp_animation=””] DSRecap Data Security Recap – A Weekly eBulletin from TechR2 In 2015, cost of data breaches surpass overall federal IT investment Reported by Indianapolis Business Journal   Read More Acquire a strong security posture today! Equipped with our advanced data-at-rest security solutions, trained and experienced in industry best practices and […]