With the ever-looming threat of data breaches and regulatory requirements, securely managing the complete lifecycle of data is no longer optional but obligatory. One critical aspect of this lifecycle is the Certificate of Destruction (CoD). Why is verifiable data destruction important?Read more
In today’s digital age, data security is a paramount concern for businesses. Yet, in the realm of IT asset management, one crucial step often gets overlooked—the retirement of hard drives and magnetic media. When it comes to eliminating data from these storage devices, degaussing reigns supreme. But what exactly is degaussing, and why is it so critical in the realm of data security? Join us as we explore the fascinating world of secure data erasure through degaussing.Read more
When it comes to data destruction for end-of-life (EOL) magnetic storage media—hard disk drives (HDDs) and tapes, degaussing stands as a leading method.
But how do you choose the right degausser for your specific needs?Read more
In 2016, Morgan Stanley faced a severe data breach that exposed the personal information of 15 million customers, resulting in a $35 million SEC fine. This incident underscores the critical importance of End-of-Life (EOL) data security. Discover the lessons learned from this breach, including the impact on customer trust and the significance of proper EOL data destruction. Explore how to prevent such incidents by implementing in-house data destruction processes and verifiable data destruction protocols.Read more
In the rapidly evolving healthcare industry, the management and protection of sensitive patient
information have become paramount. Notably, amidst all industries, healthcare stands at the forefront in terms of data breaches, further amplifying the urgency to securely handle patient data throughout its lifecycle, from electronic health records (EHRs) to medical imaging systems and other critical facets. This task is further accentuated in the digital era, where the digitization of medical records and patient information presents new challenges in data security and privacy protection.
As our world becomes increasingly digitized, the importance of protecting personal data has become more critical than ever. May 25th marks the five-year anniversary of the General Data Protection Regulation (GDPR) which has since changed the way organizations within the[…]Read more
Improper information technology asset disposition costs financial services provider tens of millions Sixty million dollars. That’s how much Morgan Stanley, a global leader in financial services, agreed to pay to clients in January 2022 in a class action lawsuit for[…]Read more
2021 was a successful year for Garner. We are grateful to our employees, customers, and business partners for believing in our mission of preventing data breaches through proper IT asset disposition. In 2021 Garner saw continued demand for our data[…]Read more
Think the data is gone? Think again. A data recovery story: “A Powerbook was trapped for two days in a sunken cruise ship at the bottom of the Amazon River. The owner grabbed their scuba gear and dove down to[…]Read more
(A story about two different CISO data security plans with real-world application of decommissioning hard drives and the threat of ransomware) CISO Andrew Data Security Plan: Focused on Ransomware When Andrew, in California, was appointed Chief Information Security Officer of[…]Read more