by Melanie Haga | Aug 27, 2024 | Blog Post, Data Destruction & Security, Electronics Recycling, Industry Insights/Resources
Understanding the eViridis E-waste Management Data Breach: What Happened and What It Means for You In an increasingly digital world, data breaches have become a significant concern for both individuals and organizations. The recent breach at eViridis, a company...
by Melanie Haga | Jul 31, 2024 | Blog Post, Electronics Recycling, IT Asset Disposition (ITAD)
6 Best Practices for storing your electronics recycling In the fast-paced world of technology, businesses frequently upgrade their computer equipment to stay competitive and efficient. However, this constant evolution leads to the accumulation of obsolete computer...
by Melanie Haga | Jun 5, 2024 | Blog Post, Data Destruction & Security, Hard Drive Shredding
Top 5 Reasons to Shred Your Hard Drives EVERYTHING is on your hard drives. Employee information, customer information, banking, research and development, legal documents, passwords, business correspondence, financial records, and more. As businesses generate vast...
by Tim Bayha | May 8, 2024 | Blog Post, IT Asset Disposition (ITAD)
In today’s digital age, insurance companies rely heavily on IT infrastructure to manage vast amounts of sensitive data, from customer information to financial records. As technology evolves, so do the risks associated with managing IT asset disposal. Improper...
by Tim Bayha | Apr 8, 2024 | Blog Post, Data Destruction & Security, Electronics Recycling, IT Asset Disposition (ITAD)
In 2022, an employee at a leading electronics recycler reported that computers that had been received and slated to be destroyed were accidentally resold on the second-hand marketplace. An investigation found that a 3rd party had unrestricted access to the warehouse....
by Tim Bayha | Feb 27, 2024 | Blog Post, Hard Drive Shredding
The Battle of Security: Hard Drive Shredding or Hard Drive Erasing In today’s digital age, data security is a paramount concern for individuals and businesses alike. As technology advances, so do the methods of safeguarding sensitive information stored on hard...