{"id":18660,"date":"2018-08-14T18:06:42","date_gmt":"2018-08-14T22:06:42","guid":{"rendered":"https:\/\/quantumlifecycle.com\/staging\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/"},"modified":"2023-09-06T15:41:35","modified_gmt":"2023-09-06T19:41:35","slug":"how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices","status":"publish","type":"post","link":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/","title":{"rendered":"How to Avoid Fraud with Better IT Security and Data Destruction Practices"},"content":{"rendered":"
IT security is a key issue for businesses and their customers as hacking and associated problems with stolen data continue to grow. According to Gemalto\u2019s Breach Level Index<\/i>, 2.6 billion records were stolen, lost or exposed<\/u><\/span><\/a> worldwide in 2017. This represented an 88 percent increase from 2016, with identity theft accounting for 69 percent of all data breaches<\/a>. Over the past five years, nearly 10 billion records have been stolen, lost or exposed. Experian\u2019s recent Global Fraud & Identity Report<\/u><\/i><\/span><\/a>, a survey of 5,500 people in 11 countries, noted that 72 percent of businesses said fraud was a growing concern for them.<\/p>\n In Canada, the introduction in 2000 of a federal privacy law for private-sector organizations, Personal Information Protection and Electronic Documents Act<\/i> (PIPEDA<\/u><\/span><\/a>), forced companies to \u201cup their game\u201d when it came to protection of personal information used for a commercial activity. Organizations must follow a code for the protection of this information that is rooted in international data protection<\/a> standards. In 2015, the Digital Privacy Act<\/a> became law as an update for PIPEDA<\/a>.<\/p>\n As an IT security professional, an integral part of your job is focusing on fraud prevention. Having an IT security plan in place to avoid fraud is a given but what are some of the most important components of such a plan? Best practices<\/a> for IT security and data destruction<\/a> are a good core.<\/p>\n IT security is a rapidly changing field that reflects the pace of change in technology. However, there are some practices that are always advisable.<\/p>\n In the electronics recycling<\/a> industry, Information Technology Asset Disposition<\/a> (or ITAD<\/u><\/span><\/a>) describes a complete process for disposing of old electronics and includes good data destruction practices. Following the five ITAD<\/a> stages will ensure that your data is destroyed safely, efficiently and in an environmentally appropriate manner.<\/p>\n The essence of good data destruction<\/u><\/span><\/a> is making sure the data is actually destroyed rather than the device being shipped to a developing country where the data is available to be misappropriated and exploited.<\/p>\n While there is not one IT security plan that will work for every business, a good fraud prevention plan will include common features such as best practices protocols around data destruction and overall online security. Using the services of an ethical recycler<\/a> such as Revolution Recycling, who are PCI compliant and have multiple industry certifications<\/u><\/span><\/a> as well as their own robust best practices, is the surest route to putting your mind at ease about fraud involving your company\u2019s data.<\/p>\nBest Practices for IT Security<\/h2>\n
\n
<\/p>\n
Best Practices for Data Destruction<\/h2>\n
\n
Where Can I Find a Recycler Who Will Handle Data Securely?<\/h2>\n