Threat Tuesday: Protect Your Offsite Backups

Joe ConnorsUncategorized

Offsite backups are critical to protecting your business’s data from a variety of threats. Fire, flood, break-ins, and natural disasters could mean that your primary business location sustained major damage that could destroy servers and on-site backups. Having an offsite backup protects you against these possibilities, allowing you to get back online and start recovering more quickly. Offsite backups can … Read More

Lessons in ITAD From The Morgan Stanley Data Breach – CyberCrunch September Newsletter

Joe ConnorsUncategorized

Welcome to the September edition of the CyberCrunch newsletter! In this issue, we’ll examine the consequences of the recent Morgan Stanley data breach and what that means for businesses who trust their data destruction to outside vendors. We’ll also answer the questions “What is data destruction?” and “What is shredding?” and how understanding both of these concepts can protect your … Read More

Threat Tuesday: Do You Need a Data Retention Policy?

Joe ConnorsUncategorized

Your business produces thousands of documents each year. Some of them need to be kept for a certain amount of time, like financial statements, contracts, and regulatory documents. But other documents are only useful for a short period of time — like emails, presentations, and invoices. But these documents can stick around for years and years, posing a legal and … Read More

Threat Tuesday: Plan Now to Dispose of WFH Hardware

Joe ConnorsUncategorized

With the COVID-19 crisis showing no signs of letting up, it could feel like the remote workforce is here to stay. But at some point, things are going to return to normal. Workers will return to the office, water cooler chit-chat will resume, and life will go on. But what will happen to the hardware that your remote workers are … Read More

Threat Tuesday: Should I Sell My Old Computers on eBay?

Joe ConnorsUncategorized

eBay is a great place to unload your unwanted stuff — and to make a few dollars doing it. This includes thousands of listings for used laptops, workstations, and servers, as well as hard drives and other components. Many companies see selling their used equipment as a way to recoup some value and offset the cost of new assets. But … Read More

Your Secure Recycling Partner – CyberCrunch August Newsletter

Joe ConnorsUncategorized

Welcome to the CyberCrunch August newsletter! In this issue, we’ll talk about how CyberCrunch can help you design a custom recycling program that meets your needs and fits your budget. Are you planning an office relocation due to COVID-19? If so, we can help with data destruction and skilled IT services — find out how below. Finally, we’d like to … Read More

Threat Tuesday: How Much Does a Data Breach Cost?

Joe ConnorsUncategorized

Cybercrime is big business nowadays, and that means that businesses are paying big for data breaches. According to IBM’s 2019 Cost of a Data Breach Report, the cost of a data breach has increased 12% over the past five years. On average, a data breach will cost a company $3.92 million. And this doesn’t mean that small- and medium-sized businesses … Read More

Threat Tuesday: How To Conduct a Data Audit

Joe ConnorsUncategorized

Do you know where your data is hiding? If you don’t, it can easily become a target for hackers and cybercriminals. Additionally, it can open you up to liabilities under consumer data protection laws if the data is misused, mishandled, or not deleted after the correct retention time. Taking a detailed audit of what data you collect, where you store … Read More

Threat Tuesday: Have a Data Breach Response Plan

Joe ConnorsUncategorized

A serious data breach can be a worst-case scenario for a business. They often catch businesses off-guard, leading to extended downtime, loss of revenue, and in some cases the complete failure of the company. If some of your company’s sensitive data were to be exposed, what would you do? Spending the time now to develop a plan can save you … Read More

Threat Tuesday: What is the Dark Web?

Joe ConnorsUncategorized

In a number of data breach news stories in recent years, you’ve probably seen one phrase pop up again and again: “dark web”. Stories like “Thousands of credit card numbers skimmed from Company X were sold on the dark web” and “Millions of login credentials from <big-website>.com hacked, leaked on Dark Web” have become rather frequent. What is the dark … Read More