CATEGORY: Data Security

What is the Best Data Destruction Method?

Digital man's face being corrupted to the left with Sadoff logo 21
Feb

The saying “once on the internet, always on the internet” highlights an important truth—data has a way of sticking around. This principle also applies to our physical devices. Simply hitting “delete” on your old computer, phone, or hard drive does... View Article

What Should You Destroy Before Recycling a Computer?

Man with smoking old computer and Sadoff logo 20
Feb

In today’s digital world, our computers hold an incredible amount of personal information. From financial records and login credentials to customer databases and confidential business documents, your old computer has the potential to become a treasure trove for prying eyes.... View Article

What Parts of a Computer Cannot be Recycled?

Old computer internals and motherboard and Sadoff logo 19
Feb

Did you know that most of your computer can be recycled? From the metal casing to circuit boards and even some plastics, valuable resources can be recovered, preventing them from ending up in landfills. However, when it comes to safely... View Article

How to Destroy Your Data

Pencil erasing the word data and Sadoff logo 9
Jan

There comes a moment in the lifecycle of any data device where you have to ask yourself how to destroy the data contained therein. This is especially true for businesses and organizations where every computer and the data drives contained... View Article

Risks of Not Having a Data Destruction Policy

People reviewing a document and Sadoff logo 28
Dec

Does your company have a data destruction policy? Are you keeping track of your equipment with an ITAD program? Do you know what you should be doing when hard drives and equipment reach the end of their life? Let Sadoff... View Article

Who is Affected by a Data Breach?

red opened lock surrounded by blue closed locks and Sadoff logo 15
Dec

Data breaches sound scary, don’t they? We all know how important data can be, or at least we have a vague concept of its importance, and a breach sounds terrifying. At the end of the day, who is affected by... View Article

Top 5 Largest Data Breaches of All Time

Data Breach text surrounded by lock iconography and Sadoff logo 5
Oct

Data breaches are a huge concern for a company of any size, but let’s take a moment to explore and perhaps appreciate the 5 largest data breaches of all time. Later, we will talk about what types of data breaches... View Article