Why Millions of CRT Screens Never Get Recycled

Although CRT TV’s and monitors have become a thing of the past for most consumers, there are still many stockpiles of CRT monitors littered across the US. One particular stockpile, from an e-scrap company known as Recycletronics, recently came under scrutiny by the U.S. EPA and led state regulators to suspend the company’s license to accept CRTs.

During a 2015 inspection, Recycletronics’ CRT stockpile filled nearly 100 corrugated pallet boxes in an outside storage area behind their warehouse. The EPA cited the company for “failing to minimize the possibility of release” of hazardous material at that location.

The company was subsequently evicted from its Iowa location in 2015 and the company’s owner, Aaron Rochester, was sued in January 2016 for breaching the company’s lease and using more property for CRT glass storage than its lease allowed for.

The Nebraska Department of Environmental Quality also confirmed that Recycletronics was previously sending its crushed CRT glass to Closed Loop Refining and Recovery in Arizona. Closed Loop closed in 2016, leaving tens of millions of pounds of leaded CRT glass at their Arizona and Ohio sites.

The former executives Closed Loop Refining and Recovery were ordered to pay more than $18 million for breaking the lease at their Columbus, Ohio headquarters and leaving behind more than 100 million pounds of CRT glass.

“Closed Loop was not engaged in legitimate CRT recycling operations at the properties but was instead engaged in the speculative accumulation and subsequent abandonment and disposal of the CRT waste at the properties without any feasible means of recycling it,” Judge Holbrook wrote in his Aug. 7 judgment.

CRT Glass Remains Outdoors

Despite all their troubles, Recycletronics hasn’t closed down. The company currently operates out of a new location in Sioux City, and are actively trying to work on their stockpile. The EPA won’t renew their CRT permit until they comply with state and federal regulations. According to Rochester, authorities have seized documents and copied information from computer hard drives and requested more information about their CRT stockpile.

The stockpile of hazardous CRT screens currently remains in a field, directly affects the environment. In the case of Closed Loop, which had five locations across Arizona and Ohio, there are also whole units of CRT monitors taking up lots of space. The total weight of abandoned CRT glass held by Recycletronics is uncertain, but for Closed Loop, figures are massive – around 250 million pounds.

Make sure your CRT Screens are correctly recycled

If you want to dispose of your CRT screens the right way, you have to find a well-established electronics recycling firm to help you out. Only a company with a proven history of following best practices can assure your scrap will not end up abandoned in an open field somewhere.

Securis can help you get rid of your CRT waste properly and protect your company from hefty fines. Contact us today to learn more about our services for recycling CRT monitors and other electronic waste. We hold certifications from R2, NAID, and the Defense Logistics Agency, and have a team of experts to ensure your electronics are disposed using industry best practices and processes.

E-Scrap Processor Caught with a FORGED R2 Certificate

The electronics recycling industry is a heavily regulated industry that requires companies to gain certifications to ensure environmentally-friendly facilities and best practices. Unfortunately, there are some cases where companies try to bypass the certification processes to increase their chances of winning new contracts.

Recently, a company called Secure Recycling from Norcross, GA tried to win a proposal from a school district using a forged R2 certificate. According to Sustainable Electronics Recycling International (SERI), the document had the facility name, date and certificate number altered. “This is the first instance of that we’ve heard of,” said Patty Osterberg, SERI’s director of education and outreach. “The way to prevent that would be when you have a certificate in hand, to look at our website directory and verify that the company is listed.”

Although this was the first time SERI saw a counterfeit R2 certificate, it’s not the first case of a business misrepresenting facts about having one. Most cases of misrepresentation involve placing the R2 logo on a company website, without any other proof. The validity of these certifications often goes unchecked because clients do not take the time to verify whether SERI officially lists these companies on their database.

The certification process

Electronics recycling companies must go through three steps to become R2 certified by SERI. In the first stage of the certification process, the company fills out an application with information about their company/facility and designates a point of contact who SERI will communicate with during the certification process.

After applying for a license, the facility must contact a SERI-approved certification body (CB) to conduct the audit and issue the R2 certificate.  Examples of SERI-approved certification bodies include National Standards Authority of Ireland, NSF International, NQA, Orion Registrar, Perry Johnson Registrars, SAI Global, SGS, and TUV SUD.

In the second step of the certification process, the electronics recycling company signs a copy of the R2 Facility License Agreement using a service which allows for the signing of documents in web browsers. The License Agreement contains the “terms of use” for the R2 logo, trademark, and certification.

After signing the agreement, the company gets an invoice for their annual R2 membership, which must be paid prior to their Stage 1 audit. The funds pay for the licensing of the R2 logo and name, as well as member benefits provided by SERI, including facility listing on the SERI website; free access to training programs, workshops or other forums; the R2 Implementation Manual and other technical assistance materials, and support from SERI staff.

Choosing the right electronics recycler

When you decide to work with an electronics recycling company, you need to make sure they have an official R2 certification. Uncertified recyclers could end up costing you time and money and put you at risk of compromising sensitive customer information. Companies with R2 certifications not only ensure quality results, but they also uphold transparency and environmental and social responsibility in their electronics recycling facilities.

As an R2 Certified company, Securis committed to helping its clients tackle their recycling needs in the most cost-effective and environmentally-friendly way. Contact us today to learn more about our services.

CES 2018: The Top 5 Weirdest Gadgets

This year’s Consumer Electronics Show in Las Vegas earlier had a bit of everything – from talking toilets to cuddly robots and weight loss headphones.

While it’s safe to say that some of these devices will never catch on, there were a few devices that caught our attention.

This article explores five of the most out-there ideas seen at CES 2018.

  1. Somnox Cuddling Pillow

Somnox is a cuddly pillow that promises to help you go to sleep faster. This nifty device simulates human breathing and can snuggle with you at night, playing lullabies or any playlist you like. Its developers say it will be available to ship in September at a price of $600.

Somnox Cuddling Pillow

  1. Zocus

Another cool device we saw at CES 2018 was Zocus. This unassuming device helps stop procrastination by monitoring your activity throughout the day. When you’re supposed to be working, the $99 Zocus disables your phone notifications and glows red to deter other people around you from disturbing you. And when it’s time for a break, the light turns turquoise, unleashing all the notifications from your phone.

Zocus

  1. Polaroid OneStep 2

Polaroid cameras were cutting edge when they came out 41 years ago. Fast forward to 2018 and the Polaroid is back, but this time as the OneStep 2. The new camera features a high-quality lens and a powerful flash that enables you to take amazing photos. It also has a long-lasting USB rechargeable battery, which makes it the ideal for just about any situation. The camera itself is very affordable with its $120 price tag.

Polaroid OneStep 2

  1. Mousr

People are already spending ridiculous amounts of money on their pets, so seeing an AI robot toy for cats comes as no surprise. The Mousr mimics movements of a real mouse, and comes with different tails you can attach depending on your cat’s personality — you can use a shorter tail for more energetic cats, and a longers tail for lazier ones. The Mousr costs $140, which may seem a little steep for some cat owners, but it’s a good purchase if you want to keep your cat entertained while you go about your day.

Mousr

  1. Keecker

Keecker is a small hovering robot that can record videos from inside your home and stream it straight to your mobile. It supports major streaming services such as Netflix, and YouTube and also transforms into a movie projector with a powerful lamp that can project to 78 inches. This is a real high-end gadget with a high-end price of $1,790. But it’s worth every penny if you’re looking something to replace your boring TV.

Keecker

Want to Get Rid of Old Gadgets?

After seeing all these gadgets, you may be thinking of throwing out your old devices and getting something new. Instead of throwing out your unused gadgets in the trash, consider recycling them. Recycling will not only save you some money, but it will also help protect the environment from electronic waste.

At Securis, we have a team of experts who can help you safely dispose of your old devices using best practices and procedures. Contact us today to learn more about our services.

Preventing Data Breaches In Your Business

Businesses today collect and store massive amounts of data about customers, employees, and competitors. This data usually stays within the confines of the company’s local network, but there are cases where it ends up in the wrong hands.

Data breaches can happen to any business, whether it’s an enterprise or a small business. The key to avoiding one is to ensure need to have a proper process for managing sensitive information.

What is a data breach?

A data breach is an incident that leads to the unauthorized release of private information such as intellectual property, personal health information (PHI), trade secrets, and personally identifiable information (PII).

Offenders commonly use data breaches to get credit card numbers, social security numbers, and healthcare histories, as well as company information, such as software source code, customer lists, and manufacturing processes.

A 2017 study by Security Metrics found that the average organization was vulnerable to security breaches for 1,549 days. What’s even more surprising is that 97% of businesses had firewalls in place at the time of compromise, and at least 15% of firewalls did not meet PCI requirements.

The longer it takes to find a breach, the higher the cost will be. Research from IBM shows that the average price of a data breach in 2016 was about $4 million. However, this cost went down to $3.62 in 2017 because the average time to detect a data breach decreased to 66 days from 70 days.

Recent data breaches

In the past ten years, there have been more than 300 data breaches involving both large and small companies.

Below are some the most notable breaches of 2017:

Yahoo

In 2013, Yahoo had a data breach that led to three billion compromised accounts. Everyone with a Yahoo account at the time was affected, but the company didn’t disclose the hack until 2017.

The breach exposed usernames, email addresses, hashed passwords, birthdays, phone numbers, as well as security questions and answers. Yahoo later confirmed that hackers were not able to get credit card information associated with each account, nor were they able to steal passwords.

Nissan

Nissan Canada is another company got hit with a data breach in 2017. Their breach mainly targeted customers that financed their vehicles through Nissan Canada Finance and INFINITI Financial Services Canada and affected 1.13 million customers.

Nissan Canada found out about the data breach on December 11 but didn’t tell customers until December 21. “We immediately began taking steps to make sure the breach happened, everyone is now being contacted,” a spokesperson at Nissan Canada said.

Equifax

The Equifax data breach of 2017 was perhaps one the most publicized breaches of the year. It affected 143 million consumers and lasted from mid-May through July.

Hackers got access to people’s names, social security numbers, birth dates, addresses and, in some cases, driver’s license numbers. They also managed to steal 209,000 credit card numbers and the personal information of 182,000 people living in the United States, the UK, and Canada.

How to prevent data breaches

Below are three things we recommend you do to prevent your company from falling victim to a data breach.

Train your employees

Create procedures and policies describing how employees should manage private data and then train your employees on the rules. You should also encourage them to follow basic best practices such as logging off their computers, encrypting shared folders, and locking their offices at the end of the day.

Protect your data

Always use a safe location or device to store records of private information. Restrict this information to only employees who must have access and never allow third-party vendors or temporary employees to access private information about your customers.

Destroy unused hardware

Destroy any devices that contain private information including CDs, DVDs, and hard drives. Simply deleting your files or reformatting your hard drives will not erase all data. The best way to completely wipe everything is to use specialized software or hire a professional.

At Securis, we have a team of experts who can help you safely dispose of private customer information from your hard drives using best practices and procedures. Contact us today to learn more about our services.

 

Is It Better to Repair or Replace Devices?

If you take a look at the most popular devices today, you’ll notice that most, if not all, of them, are very hard to repair. Unrepairable devices not only make parts harvesting and end-of-life recycling more difficult, but they also cause significant environmental waste.

These devices typically have components soldered right into the hardware, which means that users have to replace their device every time there’s a malfunction. Repairable devices, on the other hand, contain components that users can quickly repair without having to replace their whole device.

How Repairable Are Today’s Devices?

A recent study conducted by Greenpeace and iFixit between 2015 and 2017 found that the industry practice of soldering components together, coupled with design complexity has made modern devices increasingly harder to repair.

“Of all the models assessed, we found a few best-in-class products, which demonstrate that designing for repairability is possible. On the other hand, some products from Apple, Samsung, and Microsoft are increasingly being designed in ways that make it difficult for users to fix, which shortens the lifespan of these devices and adds to growing stockpiles of e-waste,” said Gary Cook, IT Sector Analyst at Greenpeace USA.

Out of all the 40 devices assessed in the study, more than 70% had batteries that were impossible or difficult to replace because of the use of adhesives and design choices. For example, both Apple’s MacBook Pro Retina laptop and Samsung’s Galaxy S8 smartphone have batteries fixed to their device panels and in most cases, the only way to repair these components is to get the devices replaced altogether.

“Electronics take a massive amount of energy, human effort, and natural resources to make,” said, Kyle Wiens, CEO of iFixit. “And yet, manufacturers produce billions more of them every year -while consumers keep them for just a few years before tossing them away. E-waste is one of the fastest-growing waste streams in the world. We should be able to make electronics a more sustainable part of our lives.”

How To Make Your Devices More Repairable

Making your devices more repairable doesn’t mean that you have to reinvent your products. The most important thing you should focus on is developing ways to make the process of repairing devices easier and affordable for your end users.

You can accomplish this by making components with high failure rates available to customers for at least seven years after the manufacture date of your product. Examples of high failure rate devices include batteries and displays.

You should also include detailed repair guides in your device packaging to help customers understand what steps they can take to repair different components in their devices, and which specialized tools they may need during the process.

Recycling Devices

Implementing hardware recycling best practices in your organization will help reduce your environmental footprint, and save money in the long run. The best way to recycle old device components is to hire a professional recycling company that specializes in the disposal of electronic waste.

When looking for a recycling company, it’s essential to only work with companies that have either R2 Solutions or e-Stewards certifications. These certifications will ensure that your customer’s data remains protected during the hardware recycling process and that your devices don’t cause any harm to the environment as they get disposed of.

Next Steps

If you would like to learn more about how to properly dispose of your electronic devices, please contact us at any time. We have certifications from R2 solutions, GSA, and the Defense Logistics Agency, and we are happy to discuss ways to keep your information safe, both while you’re repairing devices, and after you’re done with them.

 

Securis Giving Back and Being of Service

The holidays are a wonderful time to reflect on giving back and being of service to support our local and global communities. Securis is honored to participate in several philanthropic ventures year-round, and plans to continue this tradition in 2018 and for many years to come.

On a local level, we’re in our 11th year of partnering with a nearby high school to provide children in the special education program with an opportunity to get hands-on work experience. 

Students learn about electronics recycling and how to correctly and safely disassemble computers and other IT equipment for processing. The program is a career class, where the children take a bus to Secuirs’ facility, and for about the time of a traditional class, learn life skills in a safe, supportive environment alongside trained employees.

Jeremy Farber (L) with Sue Collins, Career and Transition Resource Teacher and Ken Crum (Service Source)
Jeremy Farber (L) with Sue Collins, Career and Transition Resource Teacher and Ken Crum (Service Source)

Students feel a great sense of accomplishment and pride. A couple students have even gone on to become full-time employees of Securis after high school graduation.

“Take a child who wants to be part of society, wants to work, wants to wake up in the morning and feel like they made a difference, give them that opportunity,” Securis President Jeremy Farber said.

Farber was interviewed by NBC Washington a few years ago about Securis’ participation and was recently awarded the 10 Years of Service Certificate of Appreciation and was able to attend the school’s breakfast to honor the special education program’s business partners.

Certificate of Appreciation

Securis team members also give back locally with our annual participation in the JDRF One Walk to raise funds to  for the world-wide mission to help cure, treat and prevent type 1 diabetes (T1D). 

On a global level, Securis sponsors a young woman in Moldova. Victoria, a 16-year-old who loves the color yellow, is at risk. In Moldova, the government institutional care of abandoned and orphaned children only lasts until they turn 16 years old. At that time, without support, they’d be on their own with nowhere to stay, and no family.

Securis sponsors Victoria through a program run by JMI. JMI owns a house called Grace House that’s used specifically to give girls a safe place to stay while they continue education, meet with a social worker, and participate in English lessons. At the time of entering Grace House, the girls have grown up in underfunded schools that receive about $1 a day per child for their complete care. What core strengths do they take with them when… (from the JMI website)

  • They’ve not been given the opportunity to make decisions for themselves, so they haven’t learned how to make good choices.
  • They have been deprived of witnessing normal family interactions so they will eventually enter marital relationships with only the memories of poverty, alcoholism issues and in many, many cases, family violence as their role models.
  • They have internalized the cultural misinformation that children growing up in orphanages are less intelligent.
  • They have no family to encourage them in their future studies, vocational choices and personal values.
  • They are defenseless, anonymous, naïve and the easy, natural prey of human traffickers.

The sponsorship is a 2-3 year commitment, giving girls time to complete their next level of schooling, as well as develop necessary skills to live successful lives as independent women. JMI has several levels of sponsorship and are a wonderful group to work with.

Securis wishes you and yours a warm and wonderful holiday season and leaves you with the reminder that the very best holiday gift of all is giving back and being of service to others.

What You Need to Know about HIPAA

Disposing of protected health information (PHI) isn’t as simple as tossing your hard drive in the trash and calling it a day. There are many safeguards you need to have in place to make sure your customer’s sensitive data doesn’t end up in the wrong hands. These range from training your staff on best practices to using proper disposal methods to make PHI unreadable.

The industry standard for managing IT recycling, data destruction, hard drive shredding, or computer recycling of PHI is known as the HIPAA Privacy and Security Rules. This article covers all the different safeguards and standards you’ll need to have in place to remain HIPAA compliant.

Here’s what you need to know about HIPAA

  • Organizational Standards:  Creating organizational standards is a critical first step when getting rid of public health information on your hard drive or IT infrastructure. Organizational standards are especially important if you regularly exchange public health information with other business associates or organizations.These standards should comply with all the latest rules and standards set by HIPAA and should explain each associate’s responsibilities and areas of accountability when handling public health information or managing IT recycling of PHI.
  • Policies and Procedures: Creating internal policies and rules in your organization is the best way to ensure you remain compliant with the latest HIPAA Privacy and Security Rules when shredding a hard drive or recycling a computer containing PHI.Your company must maintain written records of its security policies and procedures for at least six years after their date of creation and regularly update them based on any changes that may affect the security of PHI.
  • Administrative Safeguards: HIPAA also requires that you create administrative safeguards to prevent and detect security threats that may compromise PHI during data destruction. These safeguards should outline how your workers will handle sensitive client information and deal with any risks associated with handling PHI.Creating administrative safeguards usually starts with a comprehensive risk analysis of PHI, followed by an implementation phase. During the risk analysis stage, your goal should be to identify all vulnerabilities that may affect public health information stored on your electronic devices. You’ll then need to create and implement a detailed plan for managing data destruction, hardware and software storage, and PHI removal.
  • Physical Safeguards: Physical safeguards are policies and procedures designed to protect PHI systems, buildings and equipment from external hazards such as natural disasters and unauthorized intrusion. HIPAA requires that you implement physical safeguards within your company, and perform a complete risk analysis to evaluate all possible locations that PHI may be accessed.You may discover that PHI can be accessed in different areas of your office, or an employee’s house. In any case, you’ll need to develop a detailed facility security plan that outlines what entities have access to PHI and what steps they need to take to protect PHI in case of emergencies.

Get Rid of Public Health Information the Right Way

Getting rid of PHI doesn’t need to be complicated. If you would like to learn more about how to properly dispose of PHI, please contact us at any time. We would be happy to discuss ways to keep your data safe, both while you’re using public health information, and after you’re done with it.

We’re Thankful for You (and pie)

Happy Thanksgiving to you and yours! While we prepare to spend time with friends and family (and consume way too much turkey and pie), we want to share some of what we’re thankful for this year.

  • We’re thankful for you. Each of our customers and friends help us to stay green by keeping old IT equipment out of landfills. We’re passionate about the planet and grateful that you care as well. Thank you.
  • We’re grateful to be in a position to give back. Securis’ philanthropy includes sponsoring a child through Justice & Mercy who has been discharged from an orphanage and needs help to survive on her own.We also participate in a JDRF Walk to Cure Diabetes each year, and are in our 12th year of partnering with a local high school that provides special education children with an opportunity to get real hands-on work experience. It feels so good to give back and to feel like we’re making a difference.
  • We’re thankful for pie, and for 16 recipes for the very best Thanksgiving pies. We’re already having dreams of stuffing ourselves full of the butterscotch pecan pie. We’re not, however, as sure about the idea of rounding out our meals with a sweet potato bacon pie, but maybe it tastes better than it sounds.

Happy Thanksgiving, everybody! We appreciate each of you on Thanksgiving and all year long.

What’s On Your Wrist Might Be A Security Risk

In this day and age, people and businesses alike have more security concerns to worry about than ever before. We all carry around devices that contain sensitive information, and hackers are always looking for new ways to get into our computer systems. While we rightfully take precautions to protect our computers, smartphones, and networks, we sometimes overlook simpler devices.

We live in a time where every new device is given Internet capabilities. Thermostats, coffee makers, televisions, and watches all can connect to our networks now, and this poses a new security risk. If you’re one of the millions of people who currently wears an Internet-connected device on their wrist, you may want to think about the possible security risks.

How Wearables Compromise Security

There are two main ways that wearables – particularly fitness trackers and smartwatches – present a security risk. For starters, they store a lot of personal information. Even basic fitness trackers know your birthday, age, and weight, along with the number of steps you take in a day, your average heart rate, and, in some cases, your location. These devices typically come with less protection, making all of this personal information more accessible to hackers.

On top of this, wearables provide a gateway into any devices or networks they’re connected to. A sophisticated hacker could upload malware to your wearable device, which then transports it back to your smartphone or computer. While the likelihood of this sort of attack happening is low, that doesn’t mean that it should be ignored.

Three Precautions To Take With Your Wearables

If you want to make sure that your information remains safe – particularly if these devices are connected to business-related networks or devices – there are a few things you can do. First, if the devices are a part of a company-wide program, you should set up a separate network for them. This will isolate all devices to one network, and prevent them from having access to sensitive company equipment or information.

Next, whether you’re a business or an individual, you’ll want to know what sort of personal information your device has. For instance, if you’re uncomfortable with storing your location on your device, you might want to turn off the GPS feature. Or, don’t store your full name along with your birthday.

Companies need to know what sort of information they’re collecting from these devices. There are regulations in place regarding the collection of information, and companies and agencies want to make sure they’re in compliance.

Finally, if a device breaks, or you decide you no longer wish to use one, it’s important that all information is wiped from the device. Data destruction is an important aspect for all electronic devices, and your wearable is no different. You’ll want to ensure that all information is being properly erased from the device, rather than simply throwing it out. To do this, talk to an IT recycling or hard drive shredding company to ensure the process is completed right. Just because a device no longer works, doesn’t mean there isn’t personal information still stored on it.

Don’t Overlook The Devices You Wear

We have grown so accustomed to everything being connected to the Internet these days, that we often forget there are security risks involved. Don’t let yourself grow complacent, and treat any wearables you might have the same way you treat your smartphone or laptop. Wearables might not be the biggest security threat around, but if the time comes when someone does try and hack into yours, you’ll be happy you took precautions.

To learn more about how to properly erase data from your wearable devices, please contact us at any time. We would be happy to discuss ways to keep your information safe, both while you’re using the device, and after you’re done with it.

Wiping Isn’t Enough, You Must Destroy Data to Protect Your Data

Unlike the movies from the 1980s would lead us to believe, wiping a hard drive doesn’t remove the information from it and keep the bad guys from figuring out your next move or stealing company secrets. Just wiping a drive may leave tons of personal and company information available to someone with the right tools and knowledge.

Turns out, we need to start taking those other movies from the ‘80s, where hackers could access anything no matter how “clean” it was made, a lot more seriously than we thought.

New Study Shows Your Data Is Still There

In one of the largest reviews of used devices that were allegedly scrubbed of information, the National Association of Information Destruction (NAID) found personal information on 40% of these devices. NAID looked at a wide range of electronics including what you most likely use in your office right now: smartphones, tablets, and hard drives from PCs and laptops.

The breakdown showed information was still available on:

  • 50% of tablets
  • 44% of hard drives
  • 13% of smartphones

According to the report, the big trend  is that people aren’t successfully wiping their data using standard tools and information. And, that 40% of is a pretty terrifying number when you think of how many millions of devices that includes.

The Risk Is in Doing It Yourself

One surprising part of the NAID report is that commercially available tools actually can remove all of the personal information from a device like a smartphone or laptop. What you have right now, when used thoroughly and correctly, can protect you.

The problem lies in following complex steps and troubleshooting when things go wrong or when additional steps are needed.

“We know by the ongoing audits we conduct of [professionals] that when overwriting is properly done, it is a trustworthy and effective process,” said Robert Johnson, NAID CEO. “The problem lies with service providers who are not qualified and, too often, with businesses and individuals who feel they can do it themselves.”

The average person, and even the average IT professional, assumes they can do it all themselves correctly, without always following up or verifying that the procedure was successful. In many cases, they also lack the equipment necessary to verify a complete wipe.

The tools that come on your devices are supposed to be used as one step of many. Inherently, they can only attempt to remove information; they cannot check and verify information has been completely removed, especially in the event of a malfunction.

And one of the big reasons we get new phones, tablets, laptops, and PCs is that they have already started to malfunction in other areas. So, you can’t expect them to then work properly this one time when you need it the most.

How You Can Protect Yourself

NAID recommends using a professional to destroy your equipment and remove your data. We couldn’t agree more.

Lost and stolen data costs small companies in the U.S. hundreds of millions of dollars each year. Larger companies pay out even more and face greater penalties and regulatory concerns. On its own, Target is still paying out costs from a 2013 holiday shopping season breach and its costs have surpassed $300 million so far.

The best way to keep your business safe is to thoroughly destroy the data and hardware you no longer need with a proven process. That’s why we have a 5-step solution designed to keep IT asset and data security while ensuring proper destruction:

  1. Secure transport
  2. Inventory scanning
  3. Data degaussing (which permanently destroys the data beyond any wipe)
  4. Data and hardware shredding
  5. Domestic processing for final e-waste recycling and management

Safety isn’t just in wiping your hard drive, it’s about properly handling them. If you’re looking to sell old hardware assets, we’ll also work with you to remove the hard drives and other parts that can store data, destroying these and allowing you to safely recycle other parts that don’t pose a threat.

The good news is that you can safely perform the data destruction you need at an affordable rate. The even better news is that with the right partner, you might even have a chance to get it done at your site, under the care of professionals and the supervision of your staff.

Ready to learn what you can do to protect yourself? Contact us here for a free review and to understand what it will look like for your company to keep customers, clients, and personnel safe.