Posts Tagged ‘BRM Best Practices’
Don’t just toss that old airline luggage tag, it may come back to haunt you!
Anyone who has flown for business or pleasure has probably torn off their airline luggage tag from a previous flight and casually tossed it into the garbage in their hotel room, or at the airport, just before checking in for a return flight. Did you know that critical personal information can be obtained by reading…Read More
Scanning-Why it makes sense for your business (It does!)
Ever wonder why some people are slow to embrace technology, while others are ahead of their time? Has your business jumped into the digital world and implemented a document scanning system? If you’re a little cautious – and in the age of identity theft and credit card fraud, who can blame you – maybe a…Read More
Is your business protecting its critical information assets?
If disaster struck, would you know where to look to quickly recover your business data? Loss of important and critical business information is one of the leading causes of business failure. Insuring that you have systems and procedures in place that protect your business and client information from fire, hurricanes or other natural disasters, as…Read More
Confidential Destruction Containers – Taking office document security to the next level!
As part of our 40 Reasons Why You Should Choose Stevens & Stevens, this month we’re spotlighting one of the best ways you can protect the security and confidentiality of your records, with our confidential destruction containers, or CDCs. If your business is like most, you have plenty of paper records on hand, whether in…Read More
Protect your data with hard drive destruction!
One of the most common mistakes many people make is assuming that when they throw away a hard drive or perform a software-based “wipe” it’s enough to prevent their confidential data from being obtained and used by identity thieves. Studies have shown that a significant amount of information remains even after a hard drive is…Read More