Data destruction must be absolute, banishing any uncertainties among executives or worries among consumers. rn Some words of warning to all armchair data security “experts:” The Delete button is not a substitute for destruction; it no more eliminates data than a pink eraser removes magic marker, or a magic wand has the power to do anything more than — to ever be anything more than — a cheap prop. And yet, these same people furiously press that button, in an attempt at some kind of false self-confidence. Perhaps they think that a simple tap will make a surplus of data — from private and public correspondence to personal health records to digital documents to minutes of business meetings to confidential files to government intelligence — disappear. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Now, think of the effects of not destroying that data. Imagine the hacks and breaches, the acts of cybercrime and general thievery, in which the existence of this data compromises the economic stability of entire nations and peoples. Picture the chaos that would ensue from such a scenario. The financial cost alone is nearly $6 million per breached organization. Understanding Email Security Risks — the average breach costs over $6 million. https://t.co/6Fe5fbfflV pic.twitter.com/eldxBCGc0f — Brad Deflin (@BradDeflinTDS) June 10, 2014 That figure can bankrupt many small businesses, while forcing other companies to order mass layoffs or temporarily close. Independent studies of breached organizations further report that the vast majority of these groups had no way to alert executives of an active breach. It is this absence of any kind of security system that enables a breach to go undetected for at least 150 days or more. Given the severity of this problem, there is a clear need for a military-grade solution that destroys data — comprehensively and convincingly, beyond any shred, so to speak, of doubt — for the benefit of companies and consumers alike. For example: The commission of secure hard drive shredding is proof unto itself, meaning, a client can witness the arrival of shredding trucks and the departure of all destroyed computers, servers, terminals and more. This service, which is otherwise the exclusive province of the U.S. Department of Defense (DOD), can determine a company’s success or failure — it is the distinction that strengthens an organization’s credibility in the marketplace or weakens its reputation with customers worldwide. Gaston Wilder, executive vice president of business development at Data Destruction Inc., says: “Secure data destruction is an indispensable part of IT asset disposition. The e-waste recycling process is incomplete without it. Giving companies their choice of data destruction, be it mail-in services or onsite hard drive shredding, is critical, too. The solution must reflect the needs of each institution’s preferred level of data destruction” This attention to detail is of the highest importance for HIPAA-compliant data destruction, since doctors and patients — in addition to laboratories, researchers, scientists and insurers — cannot leave this material vulnerable for online criminals to gather or exploit. Data destruction must be absolute, banishing any uncertainties among executives or worries among consumers. Accomplishing that mission is one thing, while promoting greater knowledge of this issue is something else altogether. Let us do what is necessary — let us do what is right — to guarantee we can destroy data without any delays or fears. Related content opinion How the right technology can create value for everyone When a tech solution is pleasing, simple, effective and frictionless, it's difficult to stop using. By Andre Bourque Jun 05, 2017 6 mins Consumer Electronics IT Leadership opinion How SaaS abandonment is killing your enterprise bottom line Organizationsu2019 enterprise software infrastructure is so fragmented, business intelligence suffers severely. rn By Andre Bourque May 31, 2017 5 mins SaaS Cloud Computing opinion 7 effective strategies executives use to pick a technology partner Need your project delivered on time and under budget? Use these strategies to get those types of vendor results. By Andre Bourque May 24, 2017 9 mins Technology Industry opinion Creating a global social community for songwriters New platform, Songistry ends the isolation of individual songwriters. By Andre Bourque May 22, 2017 4 mins Enterprise Applications Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe