TechR2

Company vs. Service Provider: Data Breach Responsibility

have come across several articles over the past month or so that have talked about risk mitigation. This isn’t uncommon, but there was a recurring theme that I had to address. There has been confusion recently as to who holds more responsibility, the service provider or the company who created the data?

4 Ways Your IT Asset Disposal Vendor Can Save You Money

IT asset disposition can be a very time consuming and aggravating process. If not done correctly you risk significant costs (legal fees, fines, etc), environmental violations, and the risk of a data breach. As we have highlighted in other blogs, a solid decommissioning policy and disposition program is the first step in mitigating your risks. It is your IT asset disposal vendor that will make the difference when it comes to the execution phase. We will look at 4 ways that an IT asset disposal vendor can save you money on top of providing data security and compliance.

The Cost of a Data Breach

A malicious attack (hacking, stealing, etc) can cost up to 25% more than a non-malicious attack. However, most data breaches occur due to the negligence from within the organization. This includes, the loss of a mobile device (cell phone, external hard drive), unsecured storage of retired computers, hard drives, and other data bearing devices. Here are a few examples of some recent data breaches that are a product of improper disposal and lost media devices.

TechR2 is a Certified Woman Owned Business

Over 700 public and private sector individuals participated in establishing the Standards and Procedures of this rigid certification review. The goal of the certification program is to streamline the certification process and increase the ability of women business owners to compete for contracts at a national level.

“Certification provides a marketing opportunity for women business enterprises to participate in outreach programs, “says Lisa Rajaie- VP of Admin of TechR2. “In addition, this program will enable us to develop relationships with larger companies and create opportunities for future partnerships with public and private companies.”

Does Your Company Have the Same IT Security Lapses as the VA?

Later this month, the inspector general of the U.S. Department of Veterans Affairs will release a security audit that identifies the IT weaknesses of non-classified government agencies, according to Data Breach Today. Surprisingly, the audit confirmed cyberthreats to the VA from both domestic and international hosts.

However, an expert quoted in the article noted that the same lapses uncovered at the VA are also prevalent in the private sector, and blamed a lack of education for failure to commit to basic security measures.

Tear-A-Byte®, The patented exclusive onsite data eradication solution by TechR2

Tear-A-Byte®, The patented exclusive onsite data eradication solution by TechR2 Do you know where your hard drives go at night? The #1 cause of large-scale data breaches is the loss of data-bearing media. Data breaches have become a major concern in every business and industry, from healthcare to education, banking to retail, costing a company […]

Top 5 Ways to Ensure Data Security

Top 5 Ways to Ensure Data Security According to NIST 800-88 guidelines, it is critical that a business or organization, maintain a record of its data destruction to track the “who, what, when, where, why” of how the data was retired. Only a clear record of proper disposal can protect a business from the harm […]

The High Cost of "Free" Data Destruction

The High Cost of “Free” Data Destruction IT asset disposal made headlines around the world last week when the UK Information Commissioner’s Office (ICO) fined NHS Surrey £200,000 (about $300,000) over loss of secret data of more than 3,000 patients. According to the data watchdog, thousands of patient records were discovered on a second-hand NHS […]

Lessons Learned at Business of Security Event

Lessons Learned at Business of Security Event Last week members of the TechR2 team had the opportunity to interact with a group of seasoned Information Security leaders at a Business of Security networking event. We had a great time learning from special guests: Cindi Hart, Kim L. Jones, Kent King, Larry Mead, Mike Scott, and […]