15 Best Blogs To Follow About Data Security Trends

Many businesses are becoming more and more aware of the importance of data security. However, it can be difficult stay on top of all the latest trends and updates regarding data security. As a result, it can be helpful to follow cyber security blogs to help keep you in the loop. Here are 15 of the best blogs to follow about data security trends in no particular order, so that you don’t have to filter through some of the worst advice about data security.

  1. Brian Krebs is one of the most well known names in the security landscape. His blog is entitled Krebs on Security and he convers topics such as the latest threats, cyber criminals, privacy breaches and more.
  2. Network Security Blog is run by the Senior Security Advocate at Akamai, Martin McKeay. Running since 2003, the blog has posted upwards of 1000 posts about various aspects of cyber security.
  3. Naked Security is one of the biggest blogs around with 1.5 million view per month. There are a number of blog writers who post to the blog offering a variety of views and opinion about data security.
  4. ShackF00 is run by Dave Shackleford, the founder of Voodoo Security. This blog covers topics such as intrusion detection, vulnerability assessments, and malware to name a few.
  5. IT Security Expert Blog is a blog to follow in order to learn more about Identity theft, regulatory compliance, DDoS, Hacking, Data protection and malware.
  6. ImperialViolet is a blog run by Adam Langley who works for Google as a senior software engineer. His blog covers a variety of topics regarding cyber security and software
  7. Securosis Blog is a blog that offers topics such as application security, data security, emerging technologies and security management.
  8. Bruce Schneier is recognized around the world for a being a security guru. His blog,  Schneier on Security, has been around since 2004.
  9. Graham Cluley is another independent security analyst that is extremely well known. He has been in the security industry since the early 1990s and has held senior roles at McAfee and Sophos. His blog is entitled Graham Cluley.
  10. Dark Reading is a widely-read blog about cyber security. The blog reaches out to a variety of professionals from areas such as security research, technology specialists, and workers in the IT environment
  11. CSO online is a blog that specifically focuses on access management for enterprise servers, technology, loss prevention, software vulnerabilities and cybercriminal threats
  12. Forbes’ blog about cyber-security news is reliable and offers some of the latest information regarding security threats
  13. SC Magazine offers information about email security, mobile devices, web security and the latest information on the cloud
  14. The Hacker News has over 5 million monthly readers and is one of the biggest resources for technology, security and hacking
  15. Zero Day a blog dedicated to IT security, security analysis, malware attacks, software vulnerabilities and network threats

Data Destruction

If your company has been staying at the forefront of cyber security, you may already know the importance of data security. Not all security comes in the form of firewalls and strong passwords. Sometimes, data needs to be kept secure through data destruction. If there are any old computers, hard drives, or other electronics in your office, these are potential security threats. This is because even when files are deleted, they are still kept on the hard drive. Here are some things to know about data destruction services.

Most companies will charge an average of $10 per hard drive that is shredded. While this may seem steep, it is important to know that a data security breach will cost a company on average thousands of dollars in damage. In the grand scheme of things, taking this step now will save your company later. Destroying data can benefit your business by keeping it safe. When you get rid of old computers or electronics, there is only one way to know that old data cannot be found. You can get rid of information from a hard drive by overwriting the data or wiping the hard drive clean. However, these options do not 100% guarantee that the old data will not be recovered.

Data destruction companies also offer different options for the customer. For example, some companies offer mobile services while others are drop off only. West Coast Computer Recycler makes it easy on customers by offering a secure pick up option. This means that they will drive to your business, pick up all your old electronics and then securely transport it back to the main facility. Finally, a data destruction company should be certified. Companies should be ISO 14001 certified. This is a standardized management system that is given to companies regarding environmental management. This means that the company is complying with environmental laws and is taking steps toward minimizing negative effects on the environment.

For secure data destruction services, contact us for a Quote today!

Computer Recycling & Data Destruction
Picking your data destruction company could be a hard decision. Make sure you look into different prices, how secure the company security is and whether your needs are mobile or not.
9856 Baldwin Place
El Monte, CA
91731
US
Phone: 888-806-0525

The Top Laptop Security Trends Of This Year

In recent years, more and more people have been ditching their desktop computers and switching them for a laptop. Often cheaper and much more portable, laptops are quickly becoming the technology of choice for many business goers. However, this means that laptops have to be carefully considered when thinking about data security. In order to keep your laptop safe, here are some of the top laptop security trends of the year.

Companies such as Purism, have been offering a “kill switch” to users. With a kill switch, users simply have to flip a switch and your camera and microphone are completely switched off, making it impenetrable to hackers in the cyber verse. It has become common knowledge that even when your microphone or web camera are turned off, they can still sometimes be hacked into. With a kill switch, users can feel secure once again. There is also a kill switch offered for wireless and bluetooth, which turns off inbound and outbound radio signals. If the “kill switch” catches on, perhaps more companies will be offering this feature in forthcoming products.

Another new safety feature comes from laptop makers such as Dell and Lenovo. These companies are releasing models that support Microsoft Hello. Microsoft Hello is a security system using infrared technology. A camera scans your face, which then grants you access to using the laptop. This feature eliminates the need for passwords as the infrared camera traces the unique features of a user’s face. This technology, therefore, is extremely secure. In fact, earlier in the year, the Pentagon even ordered this technology to be used on over 4 million PCs owned by the military. This infrared camera technology is already built into the Windows 10, which makes it easy to use. It will be interesting to see whether or not Apple products follows this laptop security trend in the future.

For professional, safe and efficient computer recycling contact us for a  quote today!

Laptop Security Trend
With a kill switch, users simply have to flip a switch and your camera and microphone are completely switched off, making it impenetrable to hackers in the cyber verse. It has become common knowledge that even when your microphone or web camera are turned off, they can still sometimes be hacked into.
9856 Baldwin Place
El Monte, CA
91731
US
Phone: 888-806-0525

Let’s Shed Some Light On The OHSAS 18001 Certificate

If you your business is in the world of health and safety management, you may have already heard of the OHSAS 18001 Certification. However, are you completely sure what the certificate really entails? Let’s shed some light on the OHSAS 18001 certificate. The 18001 standard is a method of auditing and assessing occupational health and safety management systems that is accepted and used internationally. The benefit of this standard is that it provides a framework for businesses to turn to in order to ensure proper and effective management for health and safety.

In order for you business to be OHSAS certified, there will be an assessment done on key areas of your business. For example, areas that will be looked at and assessed include: management systems in place, staff training, prevention planning and risk assessment, response to emergency situations, communication of the safety management systems and monitoring and continual improvement. By being compliant with OHSAS 18001 standards, it shows that you are committed to the welfare and safety of your staff and other potential business partners. As an added benefit, it makes future safety changes easier, there are cost savings, and an overall reduction in accidents in the workplace.

OHSAS 18001 is not a framework that can only be used by some. Instead, it is suitable and useful for all types of businesses that want to become more efficient in reducing accidents in the workplace and increasing the overall safety for workers. Being accredited by OHSAS 18001 also makes it easier to meet any legal obligations to safety and health that need to be met in the workplace. When your businesses uses a third party certification body to assess workplace safety systems, it shows your team that the health of suppliers, staff, and even customers are taken seriously, which may help to increase loyalty to the business.

For professional secure services contact us for a QUOTE today!

OHSAS 18001
The 18001 standard is a method of auditing and assessing occupational health and safety management systems that is accepted and used internationally. The benefit of this standard is that it provides a framework for businesses to turn to in order to ensure proper and effective management for health and safety.
9856 Baldwin Place
El Monte, CA
91731
US
Phone: 888-806-0525

Should Anyone Knock On Your Door and Gain Access to Your Source Code?

Recently, the industry has been facing pressure to opt for open source codes. With many companies following suit, the pressure has even travelled all the way up to the White House. Indeed, the White House initiative recently stated that the federal government will now be operating on a modified open source code platform.

In the Second Open Government National Action Plan, the government has stated that they will now be releasing a draft of the Federal Source Code for public comment. This decision has benefits to both the government as well as the taxpayer. This initiative essentially states that all new software that is developed for federal agencies will now be made available for re-use and sharing across federal agencies. In addition, the initiative also states that a portion of the source code used for federal agencies will then be shared and released to the public. The benefit of this to the government is that it will promote collaboration as well as innovation across all federal agencies. In addition, it benefits the taxpayer because the taxpayer will now save money since by sharing these source codes, duplicative software purchases can now be avoided. These costs would not have been able to be avoided before, when agencies were kept in the dark about source codes that were being used across agencies.

While there are some advantages to open source coding, there are also some disadvantages as well. For example, with open source codes, the coding is out there for all the public to see. This means that if you are or your business releases its code, you are now opened to potential embarrassment. If your code is not the best or there are some kinks, it is there for all to see. In addition, with open source coding, it means that there is the potential for malicious users to see any vulnerabilities within the code and to then exploit those areas. While there are pros and cons to opening access to source codes, it is always important to stay in the loop and become familiar with the growing trends in the tech world.

For professional Data Destruction Services contact us for a quote today!

 

Source Codes
While there are some advantages to open source coding, there are also some disadvantages as well. For example, with open source codes, the coding is out there for all the public to see. This means that if you are or your business releases its code, you are now opened to potential embarrassment. If your code is not the best or there are some kinks, it is there for all to see.
9856 Baldwin Place
El Monte, CA
91731
US
Phone: 888-806-0525

Increasing Your Cyber-Security

Within recent years, the amount of cyber attacks that have befallen companies have significantly increased. The top two sectors that are having breaches include the healthcare and retail sectors. However, perhaps it may come as a surprise to find that the sector with the third highest incidents related to security breaches is the education center. Specifically, higher education with Universities and Colleges throughout the nation being targeted. This further necessitates the importance of cyber security.

Just last year, major breaches occurred at Pennsylvania State University, University of Connecticut, Washington State University, the University of Virginia and John Hopkins University. At all these schools, various information was stolen from credit card data, social security numbers, and even research information. It is likely that Universities are now being targeted because for the most part, schools are not aware that security is a problem or they are simply not catching holes in their security in time. In fact, in a recent study where Tinfoil Security tested the security networks of 557 state universities using a cross-site scripting attack, twenty-five percent of the school were vulnerable to an attack. Another reason that security breaches at Universities have been more successful than in other sectors is because often, Universities do not have strict control over the software and hardware that students and the faculty use. The difficulty increases when you consider that unlike many corporations, Universities cannot control the devices that people are bringing on campus.

Professionals suggest that there are still things that can be done to protect Universities and the students and faculty within them. They suggest that whatever limited resources schools might have for Cyber-Security is focused on protecting the most sensitive information. Another good place to start is by getting the Universities to acknowledge that cyber-attacks are a real threat in the first place. If this is the case, it is likely that more of the budget will be used for security, which will do more good in the long run.

For professional services call us for a quote today!

Cyber-Security
Cyber-Security is a crucial part of your business. Keeping yours and your clients personal information secure should be the #1 priority.
9856 Baldwin Place
El Monte, CA
91731
US
Phone: 888-806-0525

How To Prevent Major Data Breaches

It is hard to go very long in the world of business without hearing some reference to data security. However, while everyone can agree that it is important, it is often that businesses do not take enough precautions as they should. It is easy to think that a data breach could never happen to one’s own company but unfortunately, this is not the case. Within the last year, there have been major security breaches at various businesses across the nation. For all of these breaches, the attacks could have been prevented if stronger security measures had been used.

It does not matter what kind of business you are in, any type of company can fall victim to hackers. For example, there were a string of security breaches that occurred to the world of healthcare providers with companies such as Anthem Inc. and UCLA Health Systems being attacked in relative quick succession. With Anthem Inc. their security measures were not up to date and in the case of UCLA Health Systems, their patient data was not even encrypted at all. If tighter security measures had been in place, it is possible that these breaches could have been prevented. As a result of companies not cracking down on security measures, personal information such as social security numbers, dates of births, names, as well as sensitive medical information were found. Other companies such as Verizon, Home Depot, and Target all had their systems hacked. Collectively, over 7 million individuals had personal information breached from trusted agencies. While all this is unfortunate, there are things you can do to prevent situations like this from happening in the future.

Getting the most up-to-date security systems installed is extremely important in order to prevent data breaches. Hackers are coming up with new bugs just as quickly as security companies are fixing them. As a result, it is of the utmost importance that you have your systems updated frequently. Customizing your security approach is another great option as you can have your company protected in a way that is right for you.

For professional secure services contact us for a Quote today!

Preventing Data Breaches
Getting the most up-to-date security systems installed and Customizing your security approach are a couple of the things you must do to prevent major Data Breaches!
9856 Baldwin Place
El Monte, CA
91731
US
Phone: 888-806-0525

HDD Hard Drive Shredders – To Buy Or Not To Buy?

If you have old pieces of technology, such as old computers or hard drives, you may be wondering what to do with them all. In many states, it is considered illegal to throw away old computers into a landfill as it can be harmful to the environment. One of the most effective ways to get rid of old hard drives, while ensuring that your data remains safe, is through data destruction or hard drive shredding.

Hard drive shredding is the only sure fire way to safely and securely destroy old data. Much like a wood chipper is used for trees and other materials, a shredder is used on hard drives. Other forms include data wiping for example. With this method, strong magnets are used to scramble the information stored on the hard drive so that it becomes unreadable. Another method is to rewrite code over the data until it becomes unreadable. However, an expert that is highly determined could potentially sift through the coding and unlock your data and information. When your hard drive is shredded, you can rest easy knowing that all of your old data will not be able to fall into the wrong hands. Once you have decided to shred your hard drive, there are a couple decisions to make.

The first choice to make is whether or not you want to purchase a HDD shredder of your own or contract an outside service. While you can purchase hard drive shredders, they are costly and potentially dangerous as well if not used by trained professionals. When you hire an outside contractor, you can experience professionalism and a job well done. West Coast Computer Recycler is an off site, data destruction company that will help with all your data destruction needs. From hard drives, to RAM sticks to other portable devices, West Coast Computer Recycler can get the job done. They will also schedule a pickup of your items to make it easier for you. West Coast Computer Recycler is also compliant with regulations stated by the U.S. Environmental Protection Agency.

For professional hard drive shredding contact us for a QUOTE today!

Hard Drive Shredding
The first choice to make is whether or not you want to purchase a HDD shredder of your own or contract an outside service. While you can purchase hard drive shredders, they are costly and potentially dangerous as well if not used by trained professionals. When you hire an outside contractor, you can experience professionalism and a job well done.
9856 Baldwin Place
El Monte, CA
91731
US
Phone: 888-806-0525

When Should You Get A Hard Drive Shredding Service

With the speed of which technology is changing, it is likely your business might have some old pieces of technology hanging around. As long as this is the case, there is a chance that some of that important data can be stolen. Often, personal information of both employees and customers are still on old hard drives even if the computers are no longer used. In addition, even if you have deleted these files, they are still on the hard drive and can be taken. If you or your business has old computers that are not going to be reused, donated or sold, it may be a good idea to get in contact with a hard drive shredding service.

While completely shredding hard drives aren’t the only option for destroying data, it is the most guaranteed way to keep your data from getting into the wrong hands. Other services include degaussing or re-writing the hard drive. These options are best for when the computers will be donated or reused. If you you know with certainty that your computers will not be used and you are simply looking to get rid of the data, then shredding services are your best option. From here, you can choose either on site or off site shredding. On-site services mean that the company will go to your place of business and shred the hard drives then and there. Off-site services are when your hard drives are collected, driven in a secure truck, and taken back to the company’s facilities where the hard drive is then shredded.

After the process is complete, the company should then provide you with a certificate as proof that your hard drives were destroyed. Be sure to make sure they provide you with this certificate. While costs vary, most companies tend toward charging around $10 per hard drive that is destroyed. While that may seem steep, on average, a security breach of data can cost thousands of dollars in damage.

For professional shredding, call us for a quote today!

Hard Drive Shredding Service
While completely shredding hard drives aren’t the only option for destroying data, it is the most guaranteed way to keep your data from getting into the wrong hands.
9856 Baldwin Place
El Monte, CA
91731
US
Phone: 888-806-0525

Purchasing A Hard Drive Shredder

If you or your business has old electronics such as old computers, it is likely that there is still sensitive information stored on the hard drives. Even if you have deleted all of the files, the information can still be recovered when going to the hard drive. This is why many people have taken to shredding hard drives as this is the most effective way of destroying personal or sensitive data. If you are looking to get rid of information off of old devices, consider buying a hard drive shredder.

There are a variety of products that you can purchase when looking to get rid of sensitive data. For example, if you are looking to recycle or redeploy old hard drives, and simply want to remove information from it, you should look into different types of hard drive erasers or degaussers. If however, you are looking to completely destroy the hard drive as you are not planning on reusing it, then a hard drive shredder is what you should be looking into. Here are some of the best models currently out there. The PD-5 Hard Drive is CE approved and has 50% more crushing power than the previous PD-4 model. In addition, the PD-5 offers an LCD display, a 9 second cycle for two hard drives and even an optional Flash Media/SSD destruction insert option.

The MediaVise Compact HD Destroyer is also CE approved at NSA evaluated. This model will completely destroy, crush and mangle a computer hard drive making any personal information completely unreadable. The MediaVise Compact HD Destroyer with Chute is a brand new model is a newer version that offers a new feature. With the added chute, this model will automatically eject the destroyed hard drive into a waste container that is under the chute. In this way, the mangled pieces are automatically put into the waste so that you don’t have to worry about it. With this added feature, the MediaVise Compact Destroyer with Chute is the fastest, continuous data crushing machine on the market.

For professional shredding services contact us for a QUOTE today!

Buying A Hard Drive Shredder
There are a variety of products that you can purchase when looking to get rid of sensitive data. The PD-5 Hard Drive and The MediaVise Compact HD Destroyer are 2 of the many options out there.
9856 Baldwin Place
El Monte, CA
91731
US
Phone: 888-806-0525