June Newsletter – Fill Our Truck With Your Old Electronics for Just $300

Blake CormierUncategorized

Welcome to the June edition of the CyberCrunch Newsletter! In this issue, we’ll tell you the details about our exclusive Fill My Truck promo — good through the end of July. We’ll also look at what goes into the cost of electronics recycling. Plus, we’re excited to announce a special deal on our mail-back recycling program that can help you … Read More

Threat Tuesday: Protect Your Data With Asset Management

Blake CormierUncategorized

Think of how many laptops, desktops, and other assets your organization is responsible for. Do you have a simple way to find out where those assets are located and who is in possession of them? Lost, stolen, or unaccounted for hardware can present a serious threat to your data security. If a computer is misplaced or disposed of improperly, data … Read More

Threat Tuesday: What Does “Zero-Trust” Mean For ITAD?

adminUncategorized

Think about walking into a large office building. As you enter, a security guard looks at your ID badge. Then you scan it at the entrance, and the barrier allows you to enter. You’re then free to proceed to your office, your boss’s office, or wherever else you might like to go in the building. That’s how networks are traditionally … Read More

Threat Tuesday: The Rise of the APTs

adminNews

This week, it was announced that the Chinese government was behind the massive 2017 Equifax data breach that exposed the information of 147 million people. Since Mandiant (now FireEye) exposed the People’s Liberation Army’s secretive hacking group in 2013, dozens of other state-sponsored groups, known as Advanced Persistent Threats (APTs), have been identified. These groups, sponsored by the likes of … Read More

Threat Tuesday: Stolen Credentials – The Gift That Keeps On Giving

adminNews

How many times do you enter a username and password online every day? 10? 20? More? Passwords remain the universal choice for authentication on the Web. But, these strings of numbers, letters and symbols can be dangerous if they fall into the wrong hands. In more than two thirds of data breaches, stolen credentials are found to be at fault. … Read More

CyberCrunch January Newsletter

adminNewsletter

New Decade, Old Data? Destroy It The Right Way with CyberCrunch The first month of the new decade is almost done, but that doesn’t mean that last decade’s data security issues have just disappeared. In this month’s newsletter, we’ll look at how the Windows 7 end-of-life will affect your cybersecurity plans for the coming year, and how verification is an … Read More

Threat Tuesday: The Risk of Shadow IT

adminNews

Are you providing the tools your company needs to do its job? You may get different — and surprising — answers depending on exactly who you ask. While you may feel that you are providing good service to your employees, they may have a different viewpoint. And that difference presents a serious security threat to your business. “Shadow IT” is … Read More

Threat Tuesday: The Future of Encryption

adminNews

In the last few years, data-at-rest (DAR) encryption has exploded in popularity. Most smartphones now come with chips dedicated to encrypting the data stored on them. And after some high-profile data thefts involving external hard drives and laptops, more companies are now making use of technologies like BitLocker to secure data on devices that could be lost or stolen. Companies … Read More

Threat Tuesday: Make Security Easy

adminNews

You probably know Murphy’s Law: “Anything that can go wrong will go wrong.” Though we understand it as a statement of the cruelty of fate and the Universe, it actually has a deeper meeting for those who design systems that involve a human factor. Taken this way, Murphy’s Law can be summed up as: “If there are two ways of … Read More