*Certifications are held by the headquarters in Chantilly, VA
CHECK OUT WHAT SECURIS
HAS TO SAY
As part of our commitment to the community to providing ultra-secure data destruction and environmentally-friendly IT asset disposal, check out some of our articles below on the latest technology and research on electronic recycling, degaussing, hard-drive shredding and more!
NPMA Partnership Led to Successful Food Drive & Data Destruction
Posted Nov 22nd, 2019This week, Securis was able to host the NPMA NOVA (National Property Managers Association - Northern Virginia Chapter)......
Learn More8 Common HIPAA Violations and How to Avoid Them
Posted Sep 25th, 2019Professionals in the medical industry are all too familiar with HIPAA and the responsibilities it brings. Failure to fol......
Learn MoreData Protection Regulations and Opportunities You Should Know
Posted Jul 22nd, 2019The biggest news in data protection in the last several years was the GDPR changes in the European Union. Those privacy ......
Learn MoreSERI Makes Revision of R2 Certification Standard
Posted Jul 1st, 2019Are you in the market looking for a good e-waste recycling partner? Or are you currently working with a partner and you ......
Learn MoreTop E-Waste Recycling Tips for Small Business
Posted Jun 14th, 2019While it’s true that switching to digital applications has helped us reduce paper and plastic waste, the cyclical rele......
Learn MoreTop Five Human Errors That Impact Data Security
Posted Jun 3rd, 2019Despite our security innovations, human folly continues to be the source of hacks and breaches. Just last year, vulnerab......
Learn MoreHow to Find a Responsible E-Waste Partner
Posted May 29th, 2019How many times have you upgraded your smartphone over the last 5 years? If you’re an average tech enthusiast, chances ......
Learn MoreFacebook Shows Why We Need to Rethink Data Security
Posted May 6th, 2019We all remember the infamous Facebook data breach incident that took place last year. Almost 50 million user accounts we......
Learn More74% of Data Breaches Start With Privileged Credential Abuse
Posted Apr 13th, 2019How threatened are businesses when they fail to implement and prioritize Privileged Access Management? Very threatened. ......
Learn More