TechR2

IT Asset Decomissioning Policies: 7 Questions You Need to Ask

A decommissioning policy is important for many reasons. It helps you maintain compliance with local, state, and federal regulations. It creates an efficient process for your IT department, and most importantly it can save you from a costly data breach. Creating the policy can be difficult as there are many aspects that must be taken into consideration. Below are 7 things that should be considered when you are defining your company’s decommissioning policy:

Responsible IT Asset Recycling

Recent studies show that more than 1/3 of companies do not practice responsible IT Asset recycling. Proper IT asset disposal is more than just tossing out your old computers. It should be a security tactic, a measure of compliance, a part of your green initiatives, and also a tool that can add financial value to depreciated assets. IT asset disposal is more than just an obligation that companies have, it is a responsibility that should be taken seriously.

The Cost of a Data Breach

A malicious attack (hacking, stealing, etc) can cost up to 25% more than a non-malicious attack. However, most data breaches occur due to the negligence from within the organization. This includes, the loss of a mobile device (cell phone, external hard drive), unsecured storage of retired computers, hard drives, and other data bearing devices. Here are a few examples of some recent data breaches that are a product of improper disposal and lost media devices.

TechR2 is a Certified Woman Owned Business

Over 700 public and private sector individuals participated in establishing the Standards and Procedures of this rigid certification review. The goal of the certification program is to streamline the certification process and increase the ability of women business owners to compete for contracts at a national level.

“Certification provides a marketing opportunity for women business enterprises to participate in outreach programs, “says Lisa Rajaie- VP of Admin of TechR2. “In addition, this program will enable us to develop relationships with larger companies and create opportunities for future partnerships with public and private companies.”

Does Your Company Have the Same IT Security Lapses as the VA?

Later this month, the inspector general of the U.S. Department of Veterans Affairs will release a security audit that identifies the IT weaknesses of non-classified government agencies, according to Data Breach Today. Surprisingly, the audit confirmed cyberthreats to the VA from both domestic and international hosts.

However, an expert quoted in the article noted that the same lapses uncovered at the VA are also prevalent in the private sector, and blamed a lack of education for failure to commit to basic security measures.

ISO 27001: What Does It Mean & Why is it Important?

ISO 27001: What Does It Mean & Why is it Important? [vc_row][vc_column width=”1/3″][vc_column_text] We’re proud to announce that TechR2 has received ISO 27001 Certification. We’re very excited about this step forward, but what does it all mean? [/vc_column_text][/vc_column][vc_column width=”1/3″][vc_column_text]The International Organization for Standardization (ISO) provides globally recognized management standards to the electronics recycling industry on […]

Tear-A-Byte®, The patented exclusive onsite data eradication solution by TechR2

Tear-A-Byte®, The patented exclusive onsite data eradication solution by TechR2 Do you know where your hard drives go at night? The #1 cause of large-scale data breaches is the loss of data-bearing media. Data breaches have become a major concern in every business and industry, from healthcare to education, banking to retail, costing a company […]

Compliance: Privacy Regulations Based on Industry

Compliance: Privacy Regulations Based on Industry [vc_row][vc_column width=”1/3″][vc_column_text]Protecting your brand and reputation is crucial to every organization as the number of data breaches is constantly on the rise. There are guidelines already in place for most organizations. Learn more about your industry’s regulations for data security. Do you accept payment via credit card? PCI, The […]

Top 5 Ways to Ensure Data Security

Top 5 Ways to Ensure Data Security According to NIST 800-88 guidelines, it is critical that a business or organization, maintain a record of its data destruction to track the “who, what, when, where, why” of how the data was retired. Only a clear record of proper disposal can protect a business from the harm […]