EVOLVE Business and Professional Magazine November 2016 | Page 38

Crush. Kill. Destroy! The Other Side of Information Security by Todd Huffstickler and Carrie B. Chambers Y ou password-protect your business computers. You the environment by formalizing policies and procedures for protection. You limit access to your confidential some key elements of a technology disposal plan that your regularly update your systems with the latest malware business information to only those who need it to do their jobs. Most businesses take many steps to preserve their business information, but some forget that information security is not just about data preservation; it is also about effective data destruction and responsible equipment disposal. Retired computers, cell phones, tablets, monitors, printers, and other high-tech gadgets often contain residual business data—even after they are reset or reformatted. Many of these items are made with hazardous chemicals, requiring special disposal procedures. Smart businesses protect themselves and data destruction and technology recycling. Below we cover business can incorporate into its overall information security strategy. Take an Inventory In the wrong hands, your business information can be a boon to identify thieves, fraudsters, and even competitors. You can also face legal problems if confidential information in your possession, such as employee or customer names, social security numbers, credit card numbers, or other account data, is exposed or stolen. Make sure you always know the location of your personal and business information. We live in a world where personal and business use of technology has all but merged, and mobile devices carry confidential information to places you’ve never imagined. The first steps in any information security plan are to prepare and maintain a list of all devices that you and your employees use in your business and implement employee policies for turning in devices and retired electronic equipment. Wipe It Clean Once a device has been retired, it is paramount to take personal responsibility for the destruction of your data. Below are some tips for destroying data on various types of equipment. | 38 | EVOLVE BUSINESS AND PROFESSIONAL MAGAZINE