Tuesday, February 24, 2009

How to Securely Destroy Information

This is an informative and thorough piece on the CSO web site from Ben Rothke about how to securely destroy data.

Traditionally, IT security tends to look at data in motion or at rest, not on the way to the trash can. But, as this article accurately points out, the fine art of dumpster diving is far from passe. The riches found in a sample garbage expedition are enlightening, if not frightening.

The article further provides a long list of documents that should be considered in any destruction program, and whether to outsource data destruction and how to select a vendor, if that's the route a company chooses.

0 Comments:

Post a Comment

Links to this post:

Create a Link

<< Home