EVOLVE Business and Professional Magazine November 2016 | Page 38
Crush. Kill. Destroy!
The Other Side of Information Security
by Todd Huffstickler and Carrie B. Chambers
Y
ou password-protect your business computers. You
the environment by formalizing policies and procedures for
protection. You limit access to your confidential
some key elements of a technology disposal plan that your
regularly update your systems with the latest malware
business information to only those who need it to do their jobs.
Most businesses take many steps to preserve their business
information, but some forget that information security is not
just about data preservation; it is also about effective data
destruction and responsible equipment disposal.
Retired computers, cell phones, tablets, monitors, printers,
and other high-tech gadgets often contain residual business
data—even after they are reset or reformatted. Many of these
items are made with hazardous chemicals, requiring special
disposal procedures. Smart businesses protect themselves and
data destruction and technology recycling. Below we cover
business can incorporate into its overall information
security strategy.
Take an Inventory
In the wrong hands, your business information can be a
boon to identify thieves, fraudsters, and even competitors.
You can also face legal problems if confidential information in
your possession, such as employee or customer names, social
security numbers, credit card numbers, or other account data, is
exposed or stolen. Make sure you always know the location of
your personal and business information.
We live in a world where personal
and business use of technology has all
but merged, and mobile devices carry
confidential information to places you’ve
never imagined. The first steps in any
information security plan are to prepare
and maintain a list of all devices that you
and your employees use in your business
and implement employee policies for
turning in devices and retired
electronic equipment.
Wipe It Clean
Once a device has been retired, it is
paramount to take personal responsibility
for the destruction of your data. Below are
some tips for destroying data on various
types of equipment.
| 38 | EVOLVE BUSINESS AND PROFESSIONAL MAGAZINE