Secure Destruction
Records Destruction Policy – Protecting You & Your Environment
Keeping large volumes of records puts both you and the environment at risk. A Records Destruction Policy is an excellent way to reduce your exposure to the possibility of a data leak. In fact, having a Records Destruction Policy also helps protect the environment. Holding on to vast numbers of paper documents has many negative…
Read MoreWhat is a Secure Shredding Process Chain of Custody?
What does a complete shredding process look like? A key component of a correct shredding process is the chain of custody. Today we will discover why it is so important. Shredding sensitive documents and records that you no longer need to keep is a smart and cost-effective thing to do. Not only does secure shredding…
Read MoreSecure Document Shredding Myths Busted! – In House Shredding Myths
Are you still operating with incorrect data on shredding? Secure Document Shredding, like any industry, has its fair share of myths. In today’s article, we’ll separate fact from fiction and give you the data you need to have to make the right choices for your organisation. Whether your organisation is going through a digital transformation…
Read MoreSecure Shredding Service Basics – Closing the Door on Identity Theft
Identity Theft is a very real threat, secure shredding goes a long way to combating this rising scourge. Identity Theft is South Africa is commonplace and it is all too easy for criminals to gain access to your personal details. In fact, it would seem a criminal only needs your ID number to do considerable…
Read MoreData Destruction Best Practices For Better Data Security
Securing your data through smarter data destruction protocols? Data destruction and security is more important than ever these days. More and more data is being created and the pace of creation is accelerating. Ensuring your organisation’s data is secure requires a standardised approach. For many organisations and their staff, data destruction means moving files to…
Read MoreThe Worst Industries for Information and Data Leaks
The Worst Industries for Information and Data Leaks As the power of the World Wide Web develops, the number of information and data leaks increases too. There seems to be an ever growing collection of concerns regarding the protection of information and you should be concerned too. I’m not just talking about personal information and…
Read MoreWhat You Need to Know About the POPI Act Right Now!
What You Need to Know About the POPI Act Right Now! POPI Act? POPI Act is the Protection of Personal Information Act of South Africa, also known as the POPIA. The POPI Act aims to regulate how personal information is processed. The bill broadly defines personal information as anything relating to an “identifiable, living natural…
Read MoreData Breaches & Information Leaks – How Safe Are You?
Data Breaches & Information Leaks – How Safe Are You? How safe are you as a South African from data breaches and information leaks? We live in a world where information has become somewhat of a form of currency, one where every bit of data has its own value in a sea of unique data…
Read MoreHow to Dispose of Old or Unwanted Backup Media & Data Tapes
How to Dispose of Old or Unwanted Backup Media & Data Tapes Backup media usually contains sensitive or important information. So naturally, when it is no longer needed, it needs to be disposed of correctly and completely to ensure that the information cannot be accessed again. No matter the type of media you use (tapes…
Read MoreThe Records Management Lifecycle: How to Handle Every Step
The Records Management Lifecycle: How to Handle Every Step Business information and data has a natural lifecycle that spans from creation to disposal. The quality and integrity of each step in the management of records is crucial, since the records information lifecycle is intended to safeguard the privacy, integrity and accessibility of all data obtained,…
Read MoreHow to Handle Non-Value Documents and Data
A significant portion of organisations’ information is made up of non-value documents and data. How does your organisation currently handle its non-value documents and data? Before you can correctly handle your non-value documents and data, you need to understand what they are. Essentially, non-value documents and data are those documents and data that do…
Read MoreThe Paperless Paper Office
Is it possible for a paperless office and a paper office to co-exist? What is the Paperless Paper Office? In order to get the most out of this article we recommend that you first read, ‘Paper Documents still matter, more than you think’. This earlier article provides a useful comparison between paper documents and…
Read MoreDocument Shredding Services and the PoPI Act
Why proper document shredding services will become even more important to your business. While the Protection of Personal Information or PoPI Act has not yet come into force, it will inevitably have an impact on how companies, big and small, their staff, and service providers handle the retention and destruction of records and documents…
Read More3 Things You Probably Didn’t Know About Paper Shredders
We decided to put together a few interesting facts about paper shredders. Enjoy. 1. Paper Shredder History Did you know? The first paper shredder was invented by Abbot Augustus Low, and patented in 1909. Low’s invention was unfortunately never put into production. In 1935 Adolf Ehinger produced a shredder based on a hand…
Read More2 Document Shredding Dangers
You may not know it but there are dangers associated with document shredding Every year businesses in South Africa shred, recycle or otherwise get rid of tons of paper waste. Some businesses use a secure shredding service while others prefer to do it in-house. Either way, there are a number of document shredding dangers that…
Read More5 Serious Record Management Security Mistakes
How to avoid and correct mistakes that could cost your company more than just money. 1. Failing to protect your digital documents with passwords Here is one of the easiest records management security mistakes to remedy. Never underestimate the risk of data theft by unhappy employees, competitors or any other unauthorised person who might gain…
Read More