ASE Labs
Welcome Guest. Please register or log in now. There are 9 people online (0 Friends).
  • Home
  • Articles
  • News
  • Forum
  • Register/Login

Shred-it Dispels Five Commonly Held Information Security Myths

Poster: SySAdmin
Posted on October 4, 2016 at 3:14:01 AM
Shred-it Dispels Five Commonly Held Information Security Myths

LONDON, October 4, 2016 /PRNewswire/ --

    UK businesses need to separate data security fact from fiction as 2017 planning gets
underway, the UK's leading information security company Shred-it said today.

(Photo:
http://photos.prnewswire.com/prnh/20161003/414602 )

    Planning for the new business year often means handling a lot of confidential
information.  But if companies don't know information security fact from fiction, their
private data is at risk.

    Understanding and prioritising information security is critical to business success,
as data breaches significantly damage reputation and the bottom line. Why risk it? To help
put information security at the forefront of 2017 planning, Shred-it is busting five
commonly-held myths and giving businesses the facts they need to keep confidential data
secure.

    MYTH 1

    Confidential information can be thrown into a wastepaper or recycling bin as long as
it's torn into little pieces 

    If you think tearing up confidential documents before disposing of them removes the
risk of a security threat, then think again.

    The reality is that it is much easier to reconstruct torn up documents than you may
think - even documents that have been through a workplace strip-cut shredder. Anything
confidential from employee payslips to invoices, from emails to meeting agendas are in
danger of being targeted by fraudsters.

    Put a 'Shred-it All' Policy in place - a company-wide instruction that all paper
documents should be securely cross-cut shredded when they are no longer needed.

    This policy reduces the likelihood of employees making a mistake, as any choice or
uncertainty around what needs to be destroyed is removed. You can rest easy in the
knowledge that any risk of 'destroyed documents' being craftily reassembled is gone!

    MYTH 2

    Keeping documents on my desk at work is safe. 

    We've all been guilty of allowing our desk or work area to become cluttered and
chaotic. We get it - you're super busy, sorting your way through countless documents on a
daily basis.

    Workspaces are a hotbed for  sensitive information, from weighty business documents to
'harmless' sticky notes containing names, phone numbers, or passwords (information that
could easily go astray if left sitting on a desk).

    Adopting a Clean Desk Policy which requires staff to lock away all information
(documents, letters, binders, books, etc.) when leaving their workstation is a must for
any business (large and small) that wants to take data security seriously.  

    MYTH 3

    My colleagues know what information is confidential and what isn't. 

    If you're not 100% clued up on what exactly should be treated as 'confidential' then
the chances are your colleagues won't be either! Many businesses are even of the belief
that customary day to day documents such as email memos and sticky notes provide no threat
to their organisation. This lack of awareness is putting your business at risk! In fact,
95% of all security incidents involve human error[1] - showing how easy it is to make a
mistake when you don't know your facts.

    The solution? Better training. Some 56 percent of C-Suite executives say that their
staff are trained only once a year or less, while 14 percent say they train their staff
only on an ad-hoc basis or not at all[2]. Businesses need to ensure that training
programmes are carried out on a much more frequent basis (monthly rather than yearly).
Firms also need to make sure that any training is truly tailored to what the business
stands for and what their employees really need! Put simply, a generalised yearly training
session just doesn't cut it anymore!

    MYTH 4

    Using your own smart phone or another device at work is fine as long as it's password
protected. 

    Employees being allowed to use their own devices - known as BYOD (bring your own
device) - can bring lots of advantages, allowing employees to work 'anywhere at any time'
and often boosting productivity.

    But BYOD can greatly increase the risk of a data security breach as the security on
personal devices is not always adequate. Even if they are password protected, all devices
should be encrypted to protect the confidential information stored on them.

    If you allow your employees to bring their own devices, then make sure that you have
dedicated security programmes in place to protect the pathway from the personal device to
your corporate systems. What about a 'Choose Your Own Device' strategy? - purchasing
devices for your employees who can use them both on and off the job. This brings together
the best of both worlds - the same flexible benefits for employees, while safeguarding a
company's data from external and internal threats.

    MYTH 5

    Erasing data from a hard drive completely removes the information. 

    Once data is erased from a hard drive, the information is gone for good, right?
Unfortunately this is not the case. Deleted files and highly confidential data can almost
always be recovered by a determined individual using the right technique and equipment.

    Simply deleting information therefore is not enough. To truly protect both employees
and customers, professional destruction will ensure the equipment is beyond repair. In
other words, while technology is dramatically increasing information security capabilities,
a bit of old school hard drive data destruction is also strongly advised!

    About Shred-it 

    Shred-it is a world-leading information security company providing information
destruction services that ensure the security and integrity of our clients' private
information. A wholly-owned subsidiary of the US-based business to business services
company Stericycle, Shred-it operates in 170 markets throughout 18 countries worldwide,
servicing more than 400,000 global, national and local businesses. For more information,
please visit http://www.shredit.co.uk.

    1. IBM Security Services 2014 Cyber Security Intelligence Index
[http://media.scmagazine.com/documents/82/ibm_cyber_security_intelligenc_20450.pdf ]

    2. Shred-it UK Data Security Tracker 2016
[https://www.shredit.co.uk/en-gb/resource-centre/infographics/security-tracker-2016 ]

       
         
        For further information, contact: 
        Louis Fitzherbert 
        Weber Shandwick 
        Phone: +44(0)20-7067-0202 
        Email: lfitzherbert@webershandwick.com 

     

    Photo:
    http://photos.prnewswire.com/prnh/20161003/414602

Photo:http://photos.prnewswire.com/prnh/20161003/414602
http://photoarchive.ap.org/
Photo:http://photos.prnewswire.com/prnh/20161003/414602
http://photoarchive.ap.org/
Shred-it
 
Print This Entry
Tags PR Press Release
Related Articles
  • Huntkey Has Launched Its New Power Strips with USB Chargers on Amazon US
  • Inspur Releases TensorFlow-Supported FPGA Compute Acceleration Engine TF2
  • Hot Pepper Introduces Spicy New Smartphones in US Markets
  • Sharp Introduces New Desktop Printers For The Advanced Office
  • DJI Introduces Mavic 2 Pro And Mavic 2 Zoom: A New Era For Camera Drones
Login
Welcome Guest. Please register or log in now.
Forgot your password?
Navigation
  • Home
  • Articles
  • News
  • Register/Login
  • Shopping
  • ASE Forums
  • Anime Threads
  • HardwareLogic
  • ASE Adnet
Latest News
  • Kingston HyperX Cloud 2 Pro Gaming Headset Unboxing
  • Synology DS415+ Unboxing
  • D-Link DCS-5020L Wireless IP Pan/Tilt IP Camera
  • Actiontec WiFi Powerline Network Extender Kit Unboxing
  • Durovis Dive Unboxing
  • Bass Egg Verb Unboxing
  • Welcome to the new server
  • Gmail Gets Optional Preview Pane
  • HBO Go on Consoles
  • HP Touchpad Update
Latest Articles
  • D-Link Exo AC2600 Smart Mesh Wi-Fi Router DIR-2660-US
  • HyperX Double Shot PBT Keys
  • Avantree ANC032 Wireless Active Noise Cancelling Headphones
  • ScharkSpark Beginner Drones
  • HyperX Alloy FPS RGB Mechanical Gaming Keyboard
  • D-Link DCS-8300LH Full HD 2-Way Audio Camera
  • Contour Unimouse Wireless Ergonomic Mouse
  • HyperX Cloud Alpha Pro Gaming Headset
  • Linksys Wemo Smart Home Suite
  • Fully Jarvis Adjustable Standing Desk
Latest Topics
  • Hello
  • Welcome to the new server at ASE Labs
  • Evercool Royal NP-901 Notebook Cooler at ASE Labs
  • HyperX Double Shot PBT Keys at ASE Labs
  • Avantree ANC032 Wireless Active Noise Cancelling Headphones at ASE Labs
  • ScharkSpark Beginner Drones at ASE Labs
  • HyperX Alloy FPS RGB Mechanical Gaming Keyboard at ASE Labs
  • D-Link DCS-8300LH Full HD 2-Way Audio Camera at ASE Labs
  • Kingston SDX10V/128GB SDXC Memory at ASE Labs
  • What are you listening to now?
  • Antec Six Hundred v2 Gaming Case at HardwareLogic
  • Sans Digital TR5UTP 5-Bay RAID Tower at HardwareLogic
  • Crucial Ballistix Smart Tracer 6GB PC3-12800 BL3KIT25664ST1608OB at HardwareLogic
  • Cooler Master Storm Enforcer Mid-Tower Gaming Case at HardwareLogic
  • Arctic M571-L Gaming Laser Mouse at ASE Labs
  • Contour Unimouse Wireless Ergonomic Mouse at ASE Labs
Advertisement
Advertisement
Press Release
  • Huntkey Has Launched Its New Power Strips with USB Chargers on Amazon US
  • Inspur Releases TensorFlow-Supported FPGA Compute Acceleration Engine TF2
  • Hot Pepper Introduces Spicy New Smartphones in US Markets
  • Sharp Introduces New Desktop Printers For The Advanced Office
  • DJI Introduces Mavic 2 Pro And Mavic 2 Zoom: A New Era For Camera Drones
  • DJI Introduces Mavic 2 Pro And Mavic 2 Zoom: A New Era For Camera Drones
  • Fujifilm launches "instax SQUARE SQ6 Taylor Swift Edition", designed by instax global partner Taylor Swift
  • Huawei nova 3 With Best-in-class AI Capabilities Goes on Sale Today
  • Rand McNally Introduces Its Most Advanced Dashboard Camera
  • =?UTF-8?Q?My_Size_to_Showcase_Its_MySizeId=E2=84=A2_Mobil?= =?UTF-8?Q?e_Measurement_Technology_at_CurvyCon_NYC?=
Home - ASE Publishing - About Us
© 2010 Aron Schatz (ASE Publishing) [Queries: 16 (8 Cached)] [Rows: 292 Fetched: 35] [Page Generation time: 0.012935161590576]