CATEGORY: Data Security

How to Destroy Your Data

Pencil erasing the word data and Sadoff logo 9
Jan

There comes a moment in the lifecycle of any data device where you have to ask yourself how to destroy the data contained therein. This is especially true for businesses and organizations where every computer and the data drives contained... View Article

Risks of Not Having a Data Destruction Policy

People reviewing a document and Sadoff logo 28
Dec

Does your company have a data destruction policy? Are you keeping track of your equipment with an ITAD program? Do you know what you should be doing when hard drives and equipment reach the end of their life? Let Sadoff... View Article

Who is Affected by a Data Breach?

red opened lock surrounded by blue closed locks and Sadoff logo 15
Dec

Data breaches sound scary, don’t they? We all know how important data can be, or at least we have a vague concept of its importance, and a breach sounds terrifying. At the end of the day, who is affected by... View Article

Top 5 Largest Data Breaches of All Time

Data Breach text surrounded by lock iconography and Sadoff logo 5
Oct

Data breaches are a huge concern for a company of any size, but let’s take a moment to explore and perhaps appreciate the 5 largest data breaches of all time. Later, we will talk about what types of data breaches... View Article

What is a Certificate of Data Destruction?

Hard drive levitated by chains and locks and Sadoff logo 5
Oct

Data is important to any company and how that data is destroyed once devices reach the end of their life-cycle is also very important. Not tending to your data carefully during the destruction process can be disastrous. It’s one of... View Article