Document shredding: the why and the how
by Zeljka Zorz - Managing Editor - Monday, 4 February 2013.
How are the shredded remains of documents disposed of safely? Does some of it get recycled?

After a document’s lifecycle has run its course, it must be properly destroyed. There are countless ways to improperly do away with obsolete physical and digital documents, and the end result can be catastrophic. Knowing who is responsible for handling, transporting and destroying is critical to avoiding the nightmares associated with improperly discarded documents. As mentioned before, I would strongly recommend use of professional third party Secure Destruction providers to ensure a closed loop chain of custody process, secure vehicles & facilities, along with industrial shred equipment. The majority of material, particularly paper, is indeed recycled but it is important to note that the transport of the shredded material must be secure up to the time it is delivered to a mill and de-inked and re-pulped.

There has recently been an incident involving shredded confidential documents belonging to Nassau County Police Department being showered down on spectators of Macy's annual Thanksgiving Day Parade in New York. Since then, there has been no official explanation on how that was allowed to happen. Have you followed the situation and know the answer to that question? If not, how do you think this incident may have happened?

We have absolutely followed this incident and while it has not been made public as to how this occurred, my educated guess would be that the material was shredded but was not sent to a paper mill to be properly and securely recycled. It is critical that any organization has a complete understanding of what will happen with its confidential material after it has been shredded, which doesn’t necessarily mean it has been securely destroyed. Because information comes in so many forms today, keeping documents secure is infinitely more challenging than it once was. However, failure to protect critical information places a business’s financial livelihood and reputation at stake. The phrase “security breach” can be defined in a number of ways in today’s business environment, but knowing what files you have, where they are located and the information those files contain helps to drastically reduce the risk of critical information being altered without detection.

Spotlight

Emerging cloud threats and how to address them

Posted on 15 September 2014.  |  Public and community clouds can be appealing targets for hackers looking to disrupt or steal information from scores of organizations with one successful strike. Here are some emerging security threats and issues cloud providers and their clients should be aware of.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 15th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //