How to Protect Your Sensitive Data - PowerPoint PPT Presentation

About This Presentation
Title:

How to Protect Your Sensitive Data

Description:

When most people think about the safety of their sensitive data, their thoughts are mainly on what cyber security companies can do for them; what these people almost always forget is the fact that privacy and data security can happen after a device has been discarded. – PowerPoint PPT presentation

Number of Views:64

less

Transcript and Presenter's Notes

Title: How to Protect Your Sensitive Data


1
How to Protect Your Sensitive Data
2
When most people think about the safety of their
sensitive data, their thoughts are mainly on what
cyber security companies can do for them what
these people almost always forget is the fact
that privacy and data security can happen after a
device has been discarded. A great amount of
hacking these days takes place and the value of
stolen information can reach to the tune of
millions of dollars in terms of damage. There are
many high-profile breaches that take place and
companies need to ensure that data is not stolen
when they hand over their outdated devices to
electronic recycling companies.
3
Certification Getting a certified and reputable
Chicago computer recycling firm can make the
difference between data safety and a breach.
Despite the huge losses that are associated with
an improper disposal of end-of-life electronics,
there are many people who are still sending their
electronic waste to landfills instead of
arranging for proper collection and recycling.
4
When you are dealing with electronic waste,
certification is essential because it is the only
guarantee you have that the recyclers will do
their job according to the international laid
down procedures and the highest international
standards. Many certifications for electronic
recycling usually go hand in hand with secure
data destruction.      
5
Wipe data drives before collection One of the
most excellent ways to ensure that none of your
sensitive data will get compromised or
retrievable after you send it to Chicago
electronics recycling is to consider doing what
is known as data wiping. This is a term used in
the process of overwriting a hard disk in such a
way that the information becomes totally and
permanently useless afterward.
6
Data wiping is an extremely sophisticated process
just like you would expect especially when you
think about the different methods that are used
by cyber criminals to retrieve information many
users believe they had erased for good.  
7
Data wiping is an extremely sophisticated process
just like you would expect especially when you
think about the different methods that are used
by cyber criminals to retrieve information many
users believe they had erased for good.  
8
Get a certificate of destruction Data
destruction is the most important part of the
electronic recycling procedure especially if you
handle sensitive and personal information but you
still want to do away with the electronic device
the correct way. However, you must realize that
not just any style of data destruction will
suffice. The truth is that even after an
electronic device has reached its end of life and
the hard drive has been wiped, there are people
who can still retrieve the data using clandestine
methods.   
9
Data destruction goes a step further than data
wiping because it involves the physical storage
media of any electronic device so that it becomes
unusable for any future purpose. You want to
ensure that the company you hire offers a
guarantee on their data destruction and once they
have done it, they should be willing to offer you
a data destruction certificate.
Write a Comment
User Comments (0)
About PowerShow.com