by Melanie Haga | Aug 27, 2024 | Blog Post, Data Destruction & Security, Electronics Recycling, Industry Insights/Resources
Understanding the eViridis E-waste Management Data Breach: What Happened and What It Means for You In an increasingly digital world, data breaches have become a significant concern for both individuals and organizations. The recent breach at eViridis, a company...
by Melanie Haga | Jul 31, 2024 | Blog Post, Electronics Recycling, IT Asset Disposition (ITAD)
In the fast-paced world of technology, businesses frequently upgrade their computer equipment to stay competitive and efficient. However, this constant evolution leads to the accumulation of obsolete computer equipment that must be properly managed before recycling....
by Melanie Haga | Jun 5, 2024 | Blog Post, Data Destruction & Security, Hard Drive Shredding
EVERYTHING is on your hard drives. Employee information, customer information, banking, research and development, legal documents, passwords, business correspondence, financial records, and more. As businesses generate vast amounts of data, the risk of unauthorized...
by Melanie Haga | May 8, 2024 | Blog Post, IT Asset Disposition (ITAD)
In today’s digital age, insurance companies rely heavily on IT infrastructure to manage vast amounts of sensitive data, from customer information to financial records. As technology evolves, so do the risks associated with managing IT asset disposal. Improper...
by Melanie Haga | Apr 8, 2024 | Blog Post, Data Destruction & Security, Electronics Recycling, IT Asset Disposition (ITAD)
In 2022, an employee at a leading electronics recycler reported that computers that had been received and slated to be destroyed were accidentally resold on the second-hand marketplace. An investigation found that a 3rd party had unrestricted access to the warehouse....
by Melanie Haga | Feb 27, 2024 | Blog Post, Hard Drive Shredding
The Battle of SecurityIn today’s digital age, data security is a paramount concern for individuals and businesses alike. As technology advances, so do the methods of safeguarding sensitive information stored on hard drives. Two primary approaches have emerged as...