{"id":18660,"date":"2018-08-14T18:06:42","date_gmt":"2018-08-14T22:06:42","guid":{"rendered":"https:\/\/quantumlifecycle.com\/staging\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/"},"modified":"2023-09-06T15:41:35","modified_gmt":"2023-09-06T19:41:35","slug":"how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices","status":"publish","type":"post","link":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/","title":{"rendered":"How to Avoid Fraud with Better IT Security and Data Destruction Practices"},"content":{"rendered":"<p>IT security is a key issue for businesses and their customers as hacking and associated problems with stolen data continue to grow. According to Gemalto\u2019s <i>Breach Level Index<\/i>, <a href=\"https:\/\/www.businesswire.com\/news\/home\/20180410006200\/en\/2.5-billion-records-stolen-compromised-2017\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span style=\"color: #0000ff;\"><u>2.6 billion records were stolen, lost or exposed<\/u><\/span><\/a> worldwide in 2017. This represented an 88 percent increase from 2016, with identity theft accounting for 69 percent of all <a href=\"https:\/\/quantumlifecycle.com\/en_CA\/case-studies\/how-quantum-works-with-cios\/\">data breaches<\/a>. Over the past five years, nearly 10 billion records have been stolen, lost or exposed. Experian\u2019s recent <a href=\"http:\/\/www.experian.com\/blogs\/news\/2018\/01\/24\/global-fraud-report\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span style=\"color: #0000ff;\"><i><u>Global Fraud &amp; Identity Report<\/u><\/i><\/span><\/a>, a survey of 5,500 people in 11 countries, noted that 72 percent of businesses said fraud was a growing concern for them.<\/p>\n<p>In Canada, the introduction in 2000 of a federal privacy law for private-sector organizations, <i>Personal Information Protection and Electronic Documents Act<\/i> (<a href=\"https:\/\/www.priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/the-personal-information-protection-and-electronic-documents-act-pipeda\/pipeda_brief\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span style=\"color: #0000ff;\"><u>PIPEDA<\/u><\/span><\/a>), forced companies to \u201cup their game\u201d when it came to protection of personal information used for a commercial activity. Organizations must follow a code for the protection of this information that is rooted in international <a href=\"https:\/\/quantumlifecycle.com\/en_CA\/blog\/quantums-value-during-a-recession\/\">data protection<\/a> standards. In 2015, the Digital <a href=\"https:\/\/quantumlifecycle.com\/en_CA\/case-studies\/how-quantum-works-with-governments\/\">Privacy Act<\/a> became law as an update for <a href=\"https:\/\/quantumlifecycle.com\/en_CA\/blog\/what-you-need-to-do-to-comply-with-pipeda\/\">PIPEDA<\/a>.<\/p>\n<p>As an IT security professional, an integral part of your job is focusing on fraud prevention. Having an IT security plan in place to avoid fraud is a given but what are some of the most important components of such a plan? <a href=\"https:\/\/quantumlifecycle.com\/en_CA\/blog\/understanding-carbon-credits\/\">Best practices<\/a> for IT security and <a href=\"https:\/\/quantumlifecycle.com\/en_CA\/blog\/6-considerations-corporate-asset-disposition-quick-guide-professionals\/\">data destruction<\/a> are a good core.<\/p>\n<h2>Best Practices for IT Security<\/h2>\n<p>IT security is a rapidly changing field that reflects the pace of change in technology. However, there are some practices that are always advisable.<\/p>\n<ul>\n<li>Update your company\u2019s software whenever changes are prompted by the manufacturer. Most malware attacks are on identified vulnerabilities for which a fix was available but never installed.<\/li>\n<li>Backup company data frequently and make sure the backup is thoroughly protected and encrypted. Use the <a href=\"https:\/\/www.carbonite.com\/blog\/article\/2016\/01\/what-is-3-2-1-backup\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span style=\"color: #0000ff;\"><u>3-2-1 rule of backups<\/u><\/span><\/a>: Keep three copies of any important file (one primary and two backups); keep the files on two different media types; and store one copy offsite. Divide responsibility for backups among several people so no one is tempted to steal data.<\/li>\n<li><a href=\"http:\/\/home.bt.com\/tech-gadgets\/computing\/8-tips-to-make-sure-your-passwords-are-strong-but-simple-11364015494778\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span style=\"color: #0000ff;\"><u>Handle passwords securely<\/u><\/span><\/a>. A good password should be long, complex and fully unique. Prohibit employees from using their personal passwords on company accounts and from sharing passwords with each other. Set up an auto prompt system that requires all employees to enter a new password after a specific period of time.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4097 size-full aligncenter\" src=\"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2018\/08\/nlG_Jxdw-1-e1534333189981.jpeg\" alt=\"\" width=\"600\" height=\"400\" \/><\/p>\n<h2>Best Practices for Data Destruction<\/h2>\n<p>In the <a href=\"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-quantum-identified-the-most-carbon-efficient-transportation-route-for-moving-e-waste\/\">electronics recycling<\/a> industry, <a href=\"https:\/\/quantumlifecycle.com\/en_CA\/blog\/the-virtues-of-reuse-over-recycling\/\">Information Technology Asset Disposition<\/a> (or <a href=\"https:\/\/quantumlifecycle.com\/blog\/what-is-itad\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><span style=\"color: #0000ff;\"><u>ITAD<\/u><\/span><\/a>) describes a complete process for disposing of old electronics and includes good data destruction practices. Following the five <a href=\"https:\/\/quantumlifecycle.com\/en_CA\/blog\/making-sense-of-carbon-credits\/\">ITAD<\/a> stages will ensure that your data is destroyed safely, efficiently and in an environmentally appropriate manner.<\/p>\n<ul>\n<li>Logistics: getting your company\u2019s obsolete electronics to the recycler securely<\/li>\n<li>Data destruction: destroying all data with a verified process<\/li>\n<li>Asset auditing: assessing the viability and value of electronics<\/li>\n<li>Resale: restoring and reselling appropriate items<\/li>\n<li><a href=\"https:\/\/quantumlifecycle.com\/en_CA\/blog\/ghg-reduction-how-quantum-can-help-you-reach-your-sustainability-goals-while-avoiding-greenwashing\/\">Recycling<\/a>: discarding all remaining components safely and with minimal <a href=\"https:\/\/quantumlifecycle.com\/en_CA\/blog\/the-environmental-impact-of-cloud-computing-data-storage\/\">environmental impact<\/a><\/li>\n<\/ul>\n<p>The essence of <a href=\"https:\/\/quantumlifecycle.com\/blog\/what-happens-to-hard-drives-once-the-data-has-been-destroyed\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #0000ff;\"><u>good data destruction<\/u><\/span><\/a> is making sure the data is actually destroyed rather than the device being shipped to a developing country where the data is available to be misappropriated and exploited.<\/p>\n<h2>Where Can I Find a Recycler Who Will Handle Data Securely?<\/h2>\n<p>While there is not one IT security plan that will work for every business, a good fraud prevention plan will include common features such as best practices protocols around data destruction and overall online security. Using the services of an <a href=\"https:\/\/quantumlifecycle.com\/en_CA\/blog\/is-your-recycler-reliable-for-secure-product-disposition\/\">ethical recycler<\/a> such as Revolution Recycling, who are PCI compliant and have <a href=\"https:\/\/quantumlifecycle.com\/en_CA\/certifications\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #0000ff;\"><u>multiple industry certifications<\/u><\/span><\/a> as well as their own robust best practices, is the surest route to putting your mind at ease about fraud involving your company\u2019s data.<\/p>\n<p>If you have questions about your company\u2019s data destruction needs or you\u2019re ready to schedule a free pickup of hard drives or related items, <a href=\"https:\/\/quantumlifecycle.com\/en_CA\/contact\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color: #0000ff;\"><u>contact Revolution<\/u><\/span><\/a> today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With an ever growing concern for proper IT security and preventing against fraud, it is important for businesses to have a secure and trusted plan in place for their data destruction needs. With over 72 percent of businesses noting that fraud was a concern for them, it is important to know that the businesses and people handling your sensitive data are fully certified and properly dispose of your information without needing to worry about your company&#8217;s information ending up in the wrong hands. <\/p>\n","protected":false},"author":3,"featured_media":18661,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[76],"tags":[],"class_list":{"0":"post-18660","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog","8":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Avoid Fraud with Better IT Security and Data Destruction Practices<\/title>\n<meta name=\"description\" content=\"With growing concern for proper IT security and preventing against fraud, it is important to have a trusted plan in place for their data destruction needs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Avoid Fraud with Better IT Security and Data Destruction Practices\" \/>\n<meta property=\"og:description\" content=\"With growing concern for proper IT security and preventing against fraud, it is important to have a trusted plan in place for their data destruction needs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Quantum | ITAD &amp; E-Waste Recycling\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-14T22:06:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-06T19:41:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2018\/08\/which-data-destruction-is-best-Cropped.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1800\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Quantum\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Quantum\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/blog\\\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/blog\\\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\\\/\"},\"author\":{\"name\":\"Quantum\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/#\\\/schema\\\/person\\\/0d31d3a02b64f5418ee4090adb8ebfda\"},\"headline\":\"How to Avoid Fraud with Better IT Security and Data Destruction Practices\",\"datePublished\":\"2018-08-14T22:06:42+00:00\",\"dateModified\":\"2023-09-06T19:41:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/blog\\\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\\\/\"},\"wordCount\":652,\"publisher\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/blog\\\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/which-data-destruction-is-best-Cropped.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/blog\\\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\\\/\",\"url\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/blog\\\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\\\/\",\"name\":\"How to Avoid Fraud with Better IT Security and Data Destruction Practices\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/blog\\\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/blog\\\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/which-data-destruction-is-best-Cropped.jpg\",\"datePublished\":\"2018-08-14T22:06:42+00:00\",\"dateModified\":\"2023-09-06T19:41:35+00:00\",\"description\":\"With growing concern for proper IT security and preventing against fraud, it is important to have a trusted plan in place for their data destruction needs.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/blog\\\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/blog\\\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/blog\\\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/which-data-destruction-is-best-Cropped.jpg\",\"contentUrl\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/which-data-destruction-is-best-Cropped.jpg\",\"width\":1800,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/blog\\\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Avoid Fraud with Better IT Security and Data Destruction Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/#website\",\"url\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/\",\"name\":\"Quantum | ITAD & E-Waste Recycling\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/#organization\",\"name\":\"Quantum Lifecycle Partners LP\",\"url\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/quantumlifecycle.com\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/logo.svg\",\"width\":2700,\"height\":848,\"caption\":\"Quantum Lifecycle Partners LP\"},\"image\":{\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/quantumlifecycle.com\\\/en_CA\\\/#\\\/schema\\\/person\\\/0d31d3a02b64f5418ee4090adb8ebfda\",\"name\":\"Quantum\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g\",\"caption\":\"Quantum\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Avoid Fraud with Better IT Security and Data Destruction Practices","description":"With growing concern for proper IT security and preventing against fraud, it is important to have a trusted plan in place for their data destruction needs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/","og_locale":"en_US","og_type":"article","og_title":"How to Avoid Fraud with Better IT Security and Data Destruction Practices","og_description":"With growing concern for proper IT security and preventing against fraud, it is important to have a trusted plan in place for their data destruction needs.","og_url":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/","og_site_name":"Quantum | ITAD &amp; E-Waste Recycling","article_published_time":"2018-08-14T22:06:42+00:00","article_modified_time":"2023-09-06T19:41:35+00:00","og_image":[{"width":1800,"height":900,"url":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2018\/08\/which-data-destruction-is-best-Cropped.jpg","type":"image\/jpeg"}],"author":"Quantum","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Quantum","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/#article","isPartOf":{"@id":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/"},"author":{"name":"Quantum","@id":"https:\/\/quantumlifecycle.com\/en_CA\/#\/schema\/person\/0d31d3a02b64f5418ee4090adb8ebfda"},"headline":"How to Avoid Fraud with Better IT Security and Data Destruction Practices","datePublished":"2018-08-14T22:06:42+00:00","dateModified":"2023-09-06T19:41:35+00:00","mainEntityOfPage":{"@id":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/"},"wordCount":652,"publisher":{"@id":"https:\/\/quantumlifecycle.com\/en_CA\/#organization"},"image":{"@id":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2018\/08\/which-data-destruction-is-best-Cropped.jpg","articleSection":["Blog"],"inLanguage":"en-CA"},{"@type":"WebPage","@id":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/","url":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/","name":"How to Avoid Fraud with Better IT Security and Data Destruction Practices","isPartOf":{"@id":"https:\/\/quantumlifecycle.com\/en_CA\/#website"},"primaryImageOfPage":{"@id":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/#primaryimage"},"image":{"@id":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2018\/08\/which-data-destruction-is-best-Cropped.jpg","datePublished":"2018-08-14T22:06:42+00:00","dateModified":"2023-09-06T19:41:35+00:00","description":"With growing concern for proper IT security and preventing against fraud, it is important to have a trusted plan in place for their data destruction needs.","breadcrumb":{"@id":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/#primaryimage","url":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2018\/08\/which-data-destruction-is-best-Cropped.jpg","contentUrl":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2018\/08\/which-data-destruction-is-best-Cropped.jpg","width":1800,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/quantumlifecycle.com\/en_CA\/blog\/how-to-avoid-fraud-with-better-it-security-and-data-destruction-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/quantumlifecycle.com\/en_CA\/"},{"@type":"ListItem","position":2,"name":"How to Avoid Fraud with Better IT Security and Data Destruction Practices"}]},{"@type":"WebSite","@id":"https:\/\/quantumlifecycle.com\/en_CA\/#website","url":"https:\/\/quantumlifecycle.com\/en_CA\/","name":"Quantum | ITAD & E-Waste Recycling","description":"","publisher":{"@id":"https:\/\/quantumlifecycle.com\/en_CA\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/quantumlifecycle.com\/en_CA\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/quantumlifecycle.com\/en_CA\/#organization","name":"Quantum Lifecycle Partners LP","url":"https:\/\/quantumlifecycle.com\/en_CA\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/quantumlifecycle.com\/en_CA\/#\/schema\/logo\/image\/","url":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2020\/01\/logo.svg","contentUrl":"https:\/\/quantumlifecycle.com\/wp-content\/uploads\/2020\/01\/logo.svg","width":2700,"height":848,"caption":"Quantum Lifecycle Partners LP"},"image":{"@id":"https:\/\/quantumlifecycle.com\/en_CA\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/quantumlifecycle.com\/en_CA\/#\/schema\/person\/0d31d3a02b64f5418ee4090adb8ebfda","name":"Quantum","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7468b0e5785e24e253d6b9a3ee6ca074db4a0872147499c96dc94254037a7508?s=96&d=mm&r=g","caption":"Quantum"}}]}},"_links":{"self":[{"href":"https:\/\/quantumlifecycle.com\/en_CA\/wp-json\/wp\/v2\/posts\/18660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quantumlifecycle.com\/en_CA\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quantumlifecycle.com\/en_CA\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quantumlifecycle.com\/en_CA\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/quantumlifecycle.com\/en_CA\/wp-json\/wp\/v2\/comments?post=18660"}],"version-history":[{"count":1,"href":"https:\/\/quantumlifecycle.com\/en_CA\/wp-json\/wp\/v2\/posts\/18660\/revisions"}],"predecessor-version":[{"id":25200,"href":"https:\/\/quantumlifecycle.com\/en_CA\/wp-json\/wp\/v2\/posts\/18660\/revisions\/25200"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/quantumlifecycle.com\/en_CA\/wp-json\/wp\/v2\/media\/18661"}],"wp:attachment":[{"href":"https:\/\/quantumlifecycle.com\/en_CA\/wp-json\/wp\/v2\/media?parent=18660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quantumlifecycle.com\/en_CA\/wp-json\/wp\/v2\/categories?post=18660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quantumlifecycle.com\/en_CA\/wp-json\/wp\/v2\/tags?post=18660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}