CATEGORY: Data Security

Risks of Not Having a Data Destruction Policy

People reviewing a document and Sadoff logo 28
Dec

Does your company have a data destruction policy? Are you keeping track of your equipment with an ITAD program? Do you know what you should be doing when hard drives and equipment reach the end of their life? Let Sadoff... View Article

Who is Affected by a Data Breach?

red opened lock surrounded by blue closed locks and Sadoff logo 15
Dec

Data breaches sound scary, don’t they? We all know how important data can be, or at least we have a vague concept of its importance, and a breach sounds terrifying. At the end of the day, who is affected by... View Article

Top 5 Largest Data Breaches of All Time

Data Breach text surrounded by lock iconography and Sadoff logo 5
Oct

Data breaches are a huge concern for a company of any size, but let’s take a moment to explore and perhaps appreciate the 5 largest data breaches of all time. Later, we will talk about what types of data breaches... View Article

What is a Certificate of Data Destruction?

Hard drive levitated by chains and locks and Sadoff logo 5
Oct

Data is important to any company and how that data is destroyed once devices reach the end of their life-cycle is also very important. Not tending to your data carefully during the destruction process can be disastrous. It’s one of... View Article

How to Secure Unused IT Equipment

visualized data security and Sadoff logo 3
Aug

In the process of business, you are going to end up with IT equipment that’s either at the end of its life or just not in use at the moment. The problem is that much of this equipment could have... View Article