Gallery 1 Gallery 2 Gallery 3

Is Hard Drive Destruction cost effective?

February 4th, 2015 / Ian Taylor / Comments Off on Is Hard Drive Destruction cost effective?

One of the more frequent arguments we hear against shredding hard drives, is that the hard drive can not be used again. This is certainly true – but we ask the question “why would you want to”. So we sat down and ran some numbers. For the sake of our experiment, lets say we want […]

Carolina Collegiate FCU adds hard drive destruction to ShredDay

October 21st, 2013 / Ian Taylor / 1 comment

To emphasize the importance of recycling  electronics and in an effort to prevent the release of confidential information in the recycling of outdated technology, ShredDisk recently participated in Carolina Collegiate Federal Credit Union’s fall Shred Day. This was the first year the credit unions offered hard drive shredding to its members.   “Our members understand the […]

ShredDisk and Homeland Secure IT on WYFF News 4

October 21st, 2013 / Ian Taylor / 1 comment

On May 25th, WYFF News 4 ran a piece on the fact that wiping a hard drive, or deleting files on it, does not necessarily mean that all the information is really gone for good. They did a FANTASTIC job of getting the point across, and I really appreciate Tim Waller and John Hendon working with us […]

One-day freebie…

October 21st, 2013 / Ian Taylor / 11 comments

Everybody likes a freebie once in a while, but get ready for a different kind of swag from ShredDisk on May 17th. That’s when we’ll be at Grow Expo for the second year in a row, but this year we’re doing something new. We’ll have one of our trucks INSIDE the Expo, and we invite […]

Your child’s ID is at risk also…

October 21st, 2013 / Ian Taylor / 0 comments

An article in Network World has once again proved that ID thieves are heartless and conniving. This article highlights a study done by Carnegie Mellon Cylab that indicated as many as 10% of children may have had their Identity stolen before they are even old enough to know what credit is. The rate of adults who have […]

How much did the state sell to the highest bidder?

October 21st, 2013 / Ian Taylor / 0 comments

There was an article in the New York Times on March 10, 2011. Actually, there were lots of them. But this one particular article describes how the Comptroller for the State of New Jersey stopped a state equipment auction moments before 56 computers were sold to the highest bidder. The Comptroller’s office had just reviewed an audit […]

Worst fear confirmed in real-life experiment

October 21st, 2013 / Ian Taylor / 19 comments

I chose to be in the information destruction business because I wanted to help protect people from the horrors of identity theft. As a part of this business, I spend a fair amount of time educating people on how to protect themselves and their companies from data theft and misuse. In an effort to keep […]

Crooks working overtime, getting more sneaky by the minute

October 21st, 2013 / Ian Taylor / 0 comments

Being a former banker, I am familiar with the daily fight to keep money and information safe. I read an article today that highlighted how sneaky crooks are becoming, specifically in their quest to hack banks. The most recent attempt is targeting Blackberry’s and the two-factor authentication some banks employ to protect them. For those […]

Hey Brother, can you spare $7.2 million?

October 21st, 2013 / Ian Taylor / 1 comment

I just read an article regarding the cost of data breaches in 2010. The research was conducted by the Ponemon Institute for Symantec. Of the 51 case studies used in the research, the average cost to the company that was breached in 2010 was $7.2 million. Those are some big numbers, primarily from large companies. If you are a SMB, […]

Data breached during transportation

October 21st, 2013 / Ian Taylor / 0 comments

I ran across another sad article, this one published in the online version of Information Security on February 11, 2011. The full article can be found here. In this instance, a hospital used an outside supplier to transport sensitive information about patients, staff, vendors, and contractors contained on electronic media. Security controls were in place, however […]