Close

i-SIGMA - Blog

Stay up to date and engage in the latest conversation on matters within the secure destruction industry.

Shred Day is Every Day

Written By: Jason Keller, CSDS of United Electronic Recycling (Coppell, TX, USA) As our office places are prioritizing sustainability goals, what actions are needed to protect private sensitive data while also diverting from landfill dependence and making positive environmental steps? Reducing paper waste in the office is a positive environmental step. We are less likely […]

Read more »

Choosing NAID AAA Certified Paper Shredding Services

Written By: Jason Keller, CSDS of United Electronic Recycling (Coppell, TX, USA) Every business assumes risk, and a good amount of these risks are foreseeable and therefore relatively preventable.  Other risks are more formidable. When news outlets are reporting data breaches from top global brands regularly; it poses the question: can any business manage the […]

Read more »

What to Consider Before Scheduling Shredding Services

Shredding services are an essential aspect of information security, as they ensure that confidential information is not compromised. According to our recent poll of almost 200 secure information professionals within our iG Direct E-Newsletter, we asked our members and subscribers, “which is the most important thing for clients to consider before scheduling a shredding service?”. […]

Read more »

Avoiding the Everyday Scam

No one is impervious to hacking and phishing, not even the International Secure Information Governance & Management Association. Yesterday hackers were quick enough to send a pretty convincing trademark violation email through one of our email accounts. Luckily we secured the situation, although unfortunately many still received the email (If you did receive this spam […]

Read more »

SEC Adopts Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies

The SEC recently announced that it adopted rules requiring public companies to disclose material cybersecurity incidents they experience and to disclose on an annual basis material information regarding their cybersecurity risk management, strategy, and governance. i-SIGMA CEO Nathan Campbell provides comment on the recently adopted rules. Dear i-SIGMA Members, I’m writing to inform you about […]

Read more »

Can a Shredding Company Recover Lost Profit After a Truck Accident?

By: Kelsea Eckert, Attorney The answer is often YES! A shredding company may have the right to pursue lost income from an at-fault driver and the at-fault driver’s insurance company after an accident. The amount of the claim will depend on the length of downtime, as well as other circumstances and applicable laws. Here are […]

Read more »

Efficiently Keeping Your Business in Compliance

Running a business can be a daunting task, especially when it comes to ensuring compliance with various regulations and laws. Compliance is important not only for legal and ethical reasons but also for the efficiency of your business. By partnering with an i-SIGMA Certified Company who has obtained either their NAID AAA or PRISM Privacy+ […]

Read more »

The Value of Offsite Storage 

Offsite storage can provide many benefits to a business, including increased security and disaster recovery capabilities. Offsite storage is valuable to an organization for the following reasons and more:  Increased security: By storing data offsite, you can protect it from physical threats such as fires, floods, and theft, as well as unwanted employee access; good […]

Read more »

Done with Old Electronics? How to Properly Dispose of Them Without Security Risks.

As technology continues to advance, it is important for businesses and individuals to properly dispose of their electronic devices. While going to a computer recycling company or shredding business can seem like a great way to dispose of your old electronics, there are a few things you should keep in mind beforehand to ensure that […]

Read more »

It’s Data Privacy Week, Are You Really Secure?

The business world may be shifting its focus to the digital realm, but vigilant cybersecurity is only one aspect of data protection. In fact, Varonis reports that while hacking and malware attacks account for many data breaches, other breaches include much simpler methods including loss or theft of physical hard drives or files, human error, […]

Read more »