Data Security Awareness

April 25 , 2017 | Posted by TechR2 Media |
A Patented Process to Fully Protect Our Business Partners
TechR2 is the only company in the industry that has been awarded a patent (U.S. Patent 9,430,654) for its comprehensive Track-Contain-Destroy process. TechR2’s patent recognizes the unique process that TechR2 has developed to fully protect its [...]  0
April 25 , 2017 | Posted by TechR2 Media |
Top 10 features which differentiate an industry leader

What sets TechR2 apart? Here are ten features which differentiate an industry leader: Patented process – the only of its kind in the industry RFID tagging combined with proprietary software – we are not aware of

Read more

 0
April 25 , 2017 | Posted by TechR2 Media |
Industry Differentiators
This is a detailed comparison between TechR2 and other vendors who perform fully compliant media storage security and data / information eradication services.  There are companies that provide segments of TechR2's services, but we are confident [...]  0
May 24 , 2016 | Posted by Sepp Rajaie |
What You Might Have Missed: RFID Journal LIVE

On May 4, 2016, Charles Robbins, Director of Research and Development for TechR2, lead a presentation at the RFID Journal LIVE conference in Orlando, Florida  and discussed the  Tear-A-Byte® solution, which utilizes  RFID technologies. Aside from

Read more

 0
May 24 , 2016 | Posted by Sepp Rajaie |
Efficient Tear-A-Byte® Method Saves Money

…and is a Cleaner Solution for Data Eradication All processes in a data center and within the enterprise have direct and indirect costs. Managers know what the direct costs are because they are budgeted and invoiced

Read more

 0
May 24 , 2016 | Posted by Sepp Rajaie |
New TechBox Elite for Enterprise
New TechBox for Enterprise Have you ever processed an executive’s old laptop or tablet and need to secure it from theft or harm? Did you ever need a secure, protected area in the office that is [...]  0
April 27 , 2016 | Posted by TechR2 Media |
The 3 Mistakes that Led to Your Data Breach
Let’s get right to the point: in today’s world, we must track, contain and destroy the data-bearing devices when they reach the end of the life or use in order to prevent your data being compromised. [...]  0
April 27 , 2016 | Posted by TechR2 Media |
International Certifications: TechR2 Client Reach Demands
Why does Columbus, Ohio based TechR2 (leading data eradication company) have so many expensive, difficult to earn, difficult to maintain, globally respected certifications? Why are standards critical to controlling data eradication processes? Why should e-waste not [...]  0
December 15 , 2015 | Posted by TechR2 Media |
The 2-Person Security Rule Should Be Common Sense
'Saving a Few Dollars Cost Enterprise Millions' In a data center, there are two types of systems, those that are working and can be managed by the storage manager software written by companies like IBM and EMC. Then [...]  0
December 15 , 2015 | Posted by TechR2 Media |
Data at Rest = Data at Risk!
Tear-A-Byte® provides an on-going solution for the client that includes a detailed audit trail, secure containment, onsite reconciliation and certified onsite data destruction. This solution is ideal for any client with hard drive retention, providing the client with a secure solution [...]  0
October 20 , 2015 | Posted by TechR2 Media |
TechR2 RFID Tags Will Enable Full Verification of Any Disk Drive Destruction
THE CONCERN The tracking of removable or portable media has become critical due to the large amount of sensitive, confidential, personal and identifiable information contained in any such media. Loss and theft ranks high as the [...]  0
October 20 , 2015 | Posted by TechR2 Media |
About Root Cause Analysis
One of the many ISO tools used to continually improve a company’s processes is ROOT CAUSE ANALYSIS. Why is root cause analysis and systemic corrective action so important in management system standards, such as ISO 9001? [...]  0
October 20 , 2015 | Posted by TechR2 Media |
Data Destruction Myths
An IT Manager was heard to say recently "the hard drive is inoperable so let’s just send it to offsite recycling". Another data center manager chimes in and adds, they "beat their units up with hammers [...]  0