<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Electronics Archives - i-SIGMA</title>
	<atom:link href="https://isigmaonline.org/category/blog/electronics/feed/" rel="self" type="application/rss+xml" />
	<link>https://isigmaonline.org/category/blog/electronics/</link>
	<description>i-SIGMA Annual Conference and Expo Sites</description>
	<lastBuildDate>Thu, 10 Nov 2022 16:48:18 +0000</lastBuildDate>
	<language>en-CA</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>
	<item>
		<title>Updates on the Morgan Stanley Data Breach</title>
		<link>https://isigmaonline.org/updates-on-the-morgan-stanley-data-breach/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Fri, 28 Oct 2022 15:20:17 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Electronics]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Regulations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5675</guid>

					<description><![CDATA[<p>By now, most readers have most likely heard of the Morgan Stanley Data Breach incident. The latest $35M fine from the SEC, on top of the $128.2M Morgan Stanley has already shelled out, is due to the breach of personal data of 15 million customers appearing on hard drives at an auction where the data [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/updates-on-the-morgan-stanley-data-breach/">Updates on the Morgan Stanley Data Breach</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>By now, most readers have most likely heard of the <a href="https://techcrunch.com/2022/09/21/morgan-stanley-hard-drives-data-breach/" target="_blank" rel="noopener">Morgan Stanley Data Breach incident.</a> The latest $35M fine from the SEC, on top of the $128.2M Morgan Stanley has already shelled out, is due to the breach of personal data of 15 million customers appearing on hard drives at an auction where the data was supposed to have been wiped.</p>
<p>What happened that fines are still being assessed and we are still talking about this mayhem? </p>
<p>Morgan Stanley originally hired the moving company, Triple Crown, in 2016 to decommission IT assets from two data centers. It was known that Triple Crown was strictly a moving company and not experienced with electronic data destruction. The contract identified an unnamed e-scrap management company that would sanitise the devices and resell them for a commission, with Morgan Stanley obtaining a cut. It&#8217;s become known that early on, Triple Crown stopped working with the unidentified company and began working with AnythingIT without Morgan Stanley&#8217;s knowledge. AnythingIT was sold the eletronics with data still on them, having been told by Triple Crown that they had already been wiped. They in turn resold these devises downstream to KruseCom, who either destroyed or sold them on an auction site. </p>
<p>Truly a story in passing the buck and a loss in accountability. Where is the certificate of destruction? Where is the vendor due diligence? There was none, which is why Morgan Stanley is paying dearly. </p>
<p>If you look-up AnythingIT today, you&#8217;ll note that they are NAID AAA Certified. There has been some confusion on if this third-party vendor who worked in the Morgan Stanley debactle was certified, how could all of this have happened? As you can see, 1) they were given misinformation and not contracted to do the actual data wiping, AND 2) at the time of them being contracted they were not yet NAID AAA Certified. Since this incident, AnythingIT has become NAID AAA Certified and shown that they in fact DO robust quality best practices, even submitting to unannounced audits. </p>
<p>There are many lessons learned through this incident for everyone, clients and service providers alike. </p>
<p>Morgan Stanley did not take the correct precautions to ensure they hired a reputable service provider, such as a NAID AAA Certified company who would have had rigorous guidelines in place for wiping the hard drives. And it seems that service provider to service provider contracts may have been lacking as well regrading the goods being transferred (do you have language in place when you take acquisition of assets without destroying it?). </p>
<p><a href="https://isigmaonline.org/certifications/naid-aaa-certification/why-become-certified/" target="_blank" rel="noopener">Why You Should Earn Your NAID AAA Certification &gt;&gt;</a></p>
<p><a href="https://isigmaonline.org/certifications/naid-aaa-certification/why-use-a-certified-co/" target="_blank" rel="noopener">Why You Should Use a NAID AAA Certified Company &gt;&gt;</a></p>
<p>The post <a href="https://isigmaonline.org/updates-on-the-morgan-stanley-data-breach/">Updates on the Morgan Stanley Data Breach</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>That Time I Donated my Outdated Technology</title>
		<link>https://isigmaonline.org/that-time-i-donated-my-outdated-technology/</link>
		
		<dc:creator><![CDATA[naidadminconf]]></dc:creator>
		<pubDate>Tue, 07 Mar 2017 17:41:05 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Electronics]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/that-time-i-donated-my-outdated-technology/</guid>

					<description><![CDATA[<p>Kelly Martínez, NAID Director of Marketing &#38; Communications I was being responsible and cleaning out our electronics bin. Do you have one of those in the garage? The place where random cords, Ethernet cables, and broken PS2s go until they are needed (ahem &#8211; yeah right). I remember coming across lots of outdated goodies like [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/that-time-i-donated-my-outdated-technology/">That Time I Donated my Outdated Technology</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Kelly Martínez, NAID Director of Marketing &amp; Communications</strong></p>
<p>I was being responsible and cleaning out our electronics bin. Do you have one of those in the garage? The place where random cords, Ethernet cables, and broken PS2s go until they are needed (ahem &#8211; yeah right). I remember coming across lots of outdated goodies like my husband&#8217;s old palm pilot and even his as-seen-on-TV aluminum, wallet organizer he never used (I don&#8217;t know why it was in there). I kept too many random things, threw out a few, and donated the rest of our outdated technology to Goodwill. <em>Are you bristling yet? It gets better.</em></p>
<p>We moved. I cleaned out the bin again.</p>
<p>Several months later I went to look up some photos of my oldest child from when she was baby. We had saved these on an external hard-drive for safekeeping since our computer was getting old, which was a good call since it crashed shortly thereafter. The hard-drive wasn’t in the desk. But we’d moved, so that made sense. Where else, could it be? I went through a few straggler boxes in the closet with no luck. Then I thought of the electronics bin?! This is where we put random things, so I searched it. No drive. I searched everywhere. I re-looked everywhere. I was so sad. Maybe it would show up in a random, mismarked, unpacked box in the garage.</p>
<p>I went to the store to purchase a new external hard-drive in the interim. I bought the same kind as before, because we had been happy with it. But when I saw the hard-drive, my stomach dropped. Do you know what that brand of hard-drive looks like? Almost exactly like the as-seen-on-TV aluminum wallet…. I am now positive I had donated my firstborn’s baby photos to Goodwill.</p>
<p>Guess what? We didn’t just store photos on our external hard-drive either… *gulp.</p>
<p>***</p>
<p>I never recovered my terabyte hard-drive, or my precious data back. People accidentally donate stuff all the time.</p>
<p>You’re probably still cringing that I donated a palm pilot without second thought, aren’t you?  I mindfully donated it, because the technology was so outdated. If it had been a computer, I would have wiped it, but that didn’t seem important in this instance. And you know better than I that even my precautions wouldn’t have mattered.</p>
<p>How many individuals are just as clueless as I was before I joined NAID?</p>
<p>***</p>
<p>So, where do we go from here?</p>
<p>Well, I started by saving low-res images of my kid off of email and Facebook to piece-meal together a new make-shift photo library. I also have identity theft recovery insurance just in case.</p>
<p>NAID is busy educating the public to be a little wiser. This includes the recent formation of the Industry Action Committee, which focuses on the industry, commercial and government decision makers and policy writers to demonstrate the value of NAID Certification. Later this month NAID will be releasing the results of the <a href="http://www.naidonline.org/nitl/en/consumer/news/5828.html" target="_blank" rel="noopener noreferrer">largest second hand electronic device study</a>, which should bring awareness to the need for proper data destruction in this area. And NAID is also releasing a textbook this month, <em>Information Disposition: A Practical Guide to the Secure, Compliant Disposal of Records, Media and IT Assets</em>, by Bob Johnson (<a href="http://www.naidonline.org/nitl/en/consumer/news/5838.html" target="_blank" rel="noopener noreferrer">currently available for pre-order</a>). The publication will serve as the CSDS training manual, a university-level textbook, and most importantly a tool for educating clients on the nature and importance of proper data destruction. NAID will work to continue to make headway in every way possible, so that more people make less stupid mistakes like me.</p>
<p>Kelly Martínez<br />
<em>Learning More Every Day</em></p>
<p>The post <a href="https://isigmaonline.org/that-time-i-donated-my-outdated-technology/">That Time I Donated my Outdated Technology</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to secure your systems against cyber threats</title>
		<link>https://isigmaonline.org/how-to-secure-your-systems-against-cyber-threats/</link>
		
		<dc:creator><![CDATA[naidadminconf]]></dc:creator>
		<pubDate>Thu, 20 Feb 2014 20:13:57 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Electronics]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/how-to-secure-your-systems-against-cyber-threats/</guid>

					<description><![CDATA[<p>By Angie Singer Keating, Reclamere CEO You most likely already have a firewall and security software to protect your network. Thus, your systems should be well protected from any unattended probes and intrusions from viruses and other malware. However, data thieves can thwart these efforts by using the following, manual means to steal your confidential [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/how-to-secure-your-systems-against-cyber-threats/">How to secure your systems against cyber threats</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="http://www.reclamere.com/">By Angie Singer Keating, Reclamere CEO</a></p>
<p>You most likely already have a firewall and security software to protect your network. Thus, your systems should be well protected from any unattended probes and intrusions from viruses and other malware. However, data thieves can thwart these efforts by using the following, manual means to steal your confidential business information.</p>
<p><strong>Email Alerts:</strong> Don&#8217;t worry about opening suspicious emails. In most cases, all you lose is the time it takes to verify that a message is legitimate. What you have to worry about is the message inside asking you to click on a link or download an attachment. The link or attachment may contain the malicious software. Or they may lead you to a fake website that looks like it belongs to the company that sent the message. It asks you to enter your usercode and password, which the thieves then use to access your account. Never click a link in an email, even if it&#8217;s from someone you know, because the originating addresses can be faked. Instead, note the contents of the message and then delete it.</p>
<p><strong>Phony Updates:</strong> If you&#8217;ve turned on automatic updating in your operating system, you may receive several messages asking you to update software. While many of these missives are legitimate, it only takes a fraudulent one to unleash harmful code on your system. All you need do is click one of the buttons on the message and the trouble starts. Close such messages right away without clicking on anything.</p>
<p><strong>Phishing:</strong> This refers to phony websites that look like exact copies of legitimate ones. An email or update message may lead you the site, which then prompts you for your usercode or password. A big clue that the site is fraudulent is the URL in the address bar. It may not match the company website at all. In that case, close your browser immediately.</p>
<p>You can rely on one solution to thwart all these attempts. Manually browse to the originating website to determine if an update or change is truly needed. If the site did not originate the message, then report the fraudulent attempt to the website&#8217;s security department.</p>
<p>For more information on securing your systems against small business cyber threats, be sure to attend my session, &#8220;Protecting Your Company From Growing Connectivity Exposures&#8221; at the <a href="https://etouches.com/ehome/naid2014/schedule/?&amp;">NAID conference</a> on Friday, April 4.</p>
<p>The post <a href="https://isigmaonline.org/how-to-secure-your-systems-against-cyber-threats/">How to secure your systems against cyber threats</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Don’t be left behind: Adding scanning services increases shredding revenue</title>
		<link>https://isigmaonline.org/dont-be-left-behind-adding-scanning-services-increases-shredding-revenue/</link>
		
		<dc:creator><![CDATA[naidadminconf]]></dc:creator>
		<pubDate>Tue, 29 Jan 2013 21:57:42 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Electronics]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/dont-be-left-behind-adding-scanning-services-increases-shredding-revenue/</guid>

					<description><![CDATA[<p>By Andy Sokol, Owner of CopyScan and Dean of Scanning School More businesses than ever are changing the way they think about their paper records. From environmental pressures to cheaper alternatives, document scanning and imaging can revolutionize the shredding industry. Shredding companies that don’t diversify and offer scanning to their existing and future customers will suffer, especially [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/dont-be-left-behind-adding-scanning-services-increases-shredding-revenue/">Don’t be left behind: Adding scanning services increases shredding revenue</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>By Andy Sokol, Owner of CopyScan and <a href="http://www.scanningschool.com/">Dean of Scanning School</a></p>
<p>More businesses than ever are changing the way they think about their paper records. From environmental pressures to cheaper alternatives, document scanning and imaging can revolutionize the shredding<a id="_anchor_1" href="http://www.naidonline.org/nitl/en/blog/53.html#_msocom_1" name="_msoanchor_1"></a><a id="_anchor_2" href="http://www.naidonline.org/nitl/en/blog/53.html#_msocom_2" name="_msoanchor_2"></a> industry.</p>
<p>Shredding companies that don’t diversify and offer scanning to their existing and future customers will suffer, especially as managing data in the cloud becomes the standard for business document management. What’s more, they’ll miss out on a once-in-a-business-lifetime opportunity to explode their business!</p>
<p>In order to get more shredding customers, you need to also be in the document imaging business. Ray Barry, formerly of Shred School, used to ask, “Are you really in the shredding business?” If you only offer shredding to your storage customers and you don’t know how to sell it on its own, you are not in the shredding business. Andy Sokol, the Dean of Scanning School, was Barry’s third graduate of Shred School and can attest to that. In the same way, if you don’t know how to sell document scanning as its own service and your imaging revenue is based only on archive imaging, you are missing the most profitable imaging business out there, and here&#8217;s why.</p>
<p>In 1995, I built CopyScan as a document copying and scanning company without any other services. It was profitable all by itself, and in 2003, I added shredding as an additional service. Although I added other services over the years, document imaging is still the most profitable service I offer.</p>
<p>In order to sell imaging on its own, shredding company leaders need to learn a lot of new vocabulary. If you don’t understand what your customer will do with the images, how they will access them, and what system and software they are using, it will be impossible for you to do the consultative selling required to sell imaging. Archive scanning competes with box storage, which is much less expensive and is usually the most cost-efficient alternative to scanning. The misconception that most shredders have is that document scanning is not profitable. That’s because they don’t realize that document imaging is not about storage, it’s about the customer having instant access to their files. Archiving is only about storage and is the lowest margin work you will do.</p>
<p>In order to do the lucrative imaging of litigation documents for example, you need to be able to speak the litigation language. Selling imaging requires selling trust. Your prospect doesn’t trust someone that doesn’t know their lingo. You will need to learn the language and process of litigation so that you can have a conversation with a law firm like a pro. Since people will be suing other people for many years to come, don’t you want to create this revenue annuity?</p>
<p>In order to sell to corporations, you need to understand the vocabulary of business systems and the workflow that they use within their company. There is an entire language for business processes. You need to know it to confidently have the business process conversation like a pro.</p>
<p>And, yes, there are medical records. Perhaps you are wondering why this subject is last. Medical record scanning is hot right now and will be for some time to come. But document imaging was profitable long before the health care bill provided electronic medical record benefits to doctors, and it will be for many years. Remember, knowing the lingo means gaining trust.</p>
<p>And here’s the best part: All of these industries, and many others, will provide built-in shredding revenue because once the documents are scanned, they need to be shredded. There is nothing to lose by learning the document imaging business. You have everything to lose if you don’t learn.</p>
<p>CopyScan’s scanning customers never bid their shredding work and the local shredding competition doesn’t even know about the job; it’s already taken care of before the documents are ready for shredding. For more information about how to add document scanning as an additional service to your shredding company, come to our workshop at the upcoming NAID conference in Nashville, or check us out on the web at <a href="http://www.scanningschool.com/">www.scanningschool.com</a></p>
<p>The post <a href="https://isigmaonline.org/dont-be-left-behind-adding-scanning-services-increases-shredding-revenue/">Don’t be left behind: Adding scanning services increases shredding revenue</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
