Data Destruction St Louis | Secure Document Destruction of St. Louis

  • Business Shredding
  • Residential Shredding
  • FAQs
    • Frequently Asked Questions – Business
    • Residential Document Destruction FAQs
  • Blog
  • Contact Us

by

Having a Document Destruction Strategy in Place is Especially Important in a Post-Pandemic World

Why it is crucial to destroy old hard drives and data storage devices.

Having a document destruction strategy in place is critical in a post-pandemic world.

As America’s workforce shifted to a more virtual environment, businesses were faced with a new set of problems and challenges for document security, storage, and destruction.

A new wave of cyber-criminal activity has been fueled by the pandemic. Employers must also be wary and alert to manage the level of security for their employees working remotely.

As the American workforce returns to the office, it is a good time to revisit document security and destruction policies and make sure every employee understands what they are and why they are so important.

Here are some things to look at again as your workforce returns to the office and shifts back to a more traditional work environment.

Why it is crucial to destroy old hard drives and data storage devices.

All companies depend heavily on electronic media to facilitate essential business activities. But when a data storage device reaches the end of its working life, data still needs to be secured or securely destroyed.

There is a good chance that your business only focused on critical operations during the pandemic. Unfortunately, the same challenges that you faced before the pandemic continue to be challenges that your business faces now.

Securely destroying old data devices is critical to protect yourself, your clients, vendors, employees, and others from any breach of sensitive data. Business owners large and small have a sacred obligation to maintain confidentiality.

And make sure that employees working remotely are destroying important documents just as they would in the office.

Stolen data can be used for a variety of purposes…none of them good. Identity theft, fraud, embezzlement, and other white-collar crimes can ruin a victim’s life. And in many cases, that victim could be you!

Aside from the ethical considerations, are you aware as a business owner that you are required to comply with privacy laws on how to dispose of data storage devices securely? If not, you could face significant penalties.

Some industries also face higher degrees of regulation due to HIPAA and FACTA laws already on the books. If you are not well versed in privacy laws, we suggest finding an expert such as an attorney, document shredding company, or data destruction company who can safely guide you through important compliance issues.

Here’s another important thing to consider. When you leave yourself exposed and suffer a breach, it could threaten the very existence of your business. Not only could you face theft from hacked accounts, but customers could also sue or abandon you. Partners and vendors may lose trust and refuse to work with you. Key employees could move on. Your reputation could be tarnished and have a significant impact on landing future customers.

What is a zero-trust security strategy?

For some businesses during the pandemic, out of necessity, employees may have been forced to use their own non-secure data devices to conduct work remotely. In other cases, you may have supplied employees with devices for use at home during the pandemic and some of these devices may have reached the end of their useful service lives.

Don’t think for a minute when your laptops, desktops, cell phones, and other electronics reach the end of their useful service life that you can take a hammer to them and be done with your data device security efforts.

It is a lot more complicated than that.

Business compliance is a critical reason to hire a firm that specializes in data device destruction. Although laws and rules can be somewhat inconsistent, businesses should adopt a zero-trust security strategy.

This means you should not trust anybody either inside or outside of your business. A zero-trust security strategy means following best practices instead of just doing enough to meet compliance standards.

Scammers are more sophisticated than ever.

Data theft and scan operations are more prevalent than ever after the pandemic. No business is too small or too big to become a victim of a sophisticated scam operation.

In fact, in many cases, scammers prefer to target smaller companies. They assume smaller businesses do not have the resources to put toward data security.

Making yourself a hard target on the front end, and protecting sensitive data on the back end, including the appropriate disposal and destruction of hardware, is a good step in the right direction.

Employees returning to work must be armed with as much knowledge as possible to guard against sophisticated scammers and data thieves. According to the Better Business Bureau, the six most common of these that businesses and employees need to protect against are:

  • Imposters posing as a bank or credit card company pretending to verify account information but with the actual intent of gaining access to a business’s accounts.
  • Scammers pretending to represent various government agencies who threaten to impose fines or take similar enforcement actions if a business does not pay fees or taxes.
  • Fraudsters who offer businesses increased visibility through advertising, advanced search engine techniques, and business directories.
  • Sending an invoice for services never rendered or trying to induce a business to pay for products they never ordered or received.
  • Paying for goods and services with fraudulent checks from non-existent accounts.
  • Scams involving tech support or ransomware demands.

Although every scam and every scammer are unique, most all share the same general characteristics. Here are some red flags to look for:

  • They pretend to be someone you trust, either in the guise of a company, person, or government agency.
  • They create a sense of urgency by setting a short deadline to respond.
  • They use fear and intimidation, pressuring you to send a payment before you can check out their claims.
  • They use wire transfers, gift cards, or other untraceable payment methods.

Based on what’s happened over the past year and a half, don’t be surprised if a potential scam is attached to some sort of pandemic-related issue. The same adage applies: If it sounds too good to be true, it usually is.

What do I do if I think I have been scammed?

Unfortunately, the best you may be able to do is to harden yourself against being a victim again. Getting lost money will be difficult.

Examine your current levels of security. Can you do more within your budget to enhance your protection?

If your company’s financial information was accessed or stolen as part of a scam, change as much information as you can. You may only need to change passwords, or you may have to close and reopen accounts.

If phones or computers were hacked, spend the money to have a top-tier security person either wipe the phone clean of malicious software or take other steps to ensure the breach no longer exists.

Develop a cybersecurity plan that looks at risks and identifies proactive mitigation efforts. Part of this should include a stringent password policy for all employees and their devices. Among other things, use two-factor or multi-factor authentication when possible.

Evaluate your data storage needs and processes. Scammers often nail a business through the back door. When you update with the latest security patches on your phones and computers, make sure your data storage is equally protected. Uncompromised data storage is critical, especially in cases where businesses are victims of ransomware schemes.

And finally, provide security training for your employees. Scammers know the weakest link in a business may be the human element. Don’t let that be the case in your business.

How do I choose the right data device destruction company?

If your business survived the pandemic, then congratulations!

Although you are gearing up on many different fronts, do not discount the many benefits of retaining a data device destruction company as an essential insurance policy for your business’s long-term health.

Data and device destruction is big business, and there are lots of companies to choose from. A few things you should look for in a vendor include:

Compliance. Ask if they are familiar with NSA and NIST guidelines.

Chain of custody. What are the company’s protocols to protect against a breach? Do they use tamper-proof containers, secured totes, and locked trucks during transit? Do they have secure and monitored facilities?

Certificates and documentation. Make sure the company provides certificates of sanitization for all media’s data that has been destroyed. It should include serial numbers, type of media, and how it was sanitized. Also, verify that documentation will be provided that shows an audit trail and proof of erased data.

Insurance. Does the company have liability insurance to adequately assume responsibility if there is a data breach or mishap? Also, ask about what kind of security training and background checks employees undergo.

Process. Get a detailed explanation of exactly how data devices will be destroyed and by what method.

Filed Under: Data Destruction

by

Does Your Business Need Cyber Liability Insurance?

Cyber Security Insurance

As businesses have migrated electronically and to online platforms, our interconnected world has made us more efficient than ever.

We process more data than ever before, faster than ever before, to remain more competitive than ever before.

But those benefits are not without risks.

Business infrastructures, networks, customers, and end-users are all subject to an unprecedented level of sophisticated intruders who understand the value of accessing data. We live in a world where the terms hacking, phishing, worms, viruses, ransomware, eavesdropping, denial of service attacks, and other similar illicit actions are commonplace.

Big breaches get the headlines.

For example, in 2017, Equifax was hacked, and nearly 148 million consumers’ names, Social Security numbers, birth dates, addresses, and driver’s license information were stolen.

But every business, big or small, is at risk.

Although firewalls, intrusion-detection systems, cryptographic enhancements, antivirus and anti-spam software, and other countermeasures solve many of these problems, there is still a real and credible threat to the cyber frameworks of businesses.

In short, the target keeps moving, making it impossible to create a perfect cyber-security environment.

Still, as a business owner, you need to do everything you can to protect your critical information and minimize your financial vulnerabilities if you are a cyber information victim.

That’s why you should consider cyber liability insurance.

What is Cyber Liability Insurance?

Cyber liability insurance covers financial losses resulting from cyber events that negatively impact your business.

These impacts may include intentional cyberattacks or other tech-related risks. Coverage can protect business owners from lawsuits following an attack or costs associated with privacy and security investigations that can disrupt a business’s normal course of activities.

Cyber liability insurance can also cover legal services to help meet state and federal regulations, including notification expenses to affected customers following a cyber compromise event. State and federal agency regulatory fines are also generally covered as well as lost income from network outages.

It is recommended for most larger businesses, but small businesses, depending on the nature of their goods and services, can benefit from this type of coverage as well.

Policies vary from insurer to insurer, and most policies are flexible and can be customized depending on your needs.

Also, most policies include first-party and third-party coverage.

Here’s what that means.

First-Party vs. Third-Party Coverage

First-party coverage insures against loss to your data or income or loss of any other aspect of your business as a direct result of a cyber-attack. This may include:

  • Loss of funds from theft or fraud.
  • Loss of income and costs if your business activities are interrupted.
  • Legal, technical and forensic services. Business owners may retain these services to determine if a breach has taken place, the extent of the breach, and how to fix the problem.
  • Cyber extortion costs such as when a hacker enters your computer system and threatens to damage your data, introduce a virus, or initiate a denial of service attack unless you pay a ransom.
  • Replacement costs for the physical damage to business computer hardware and software.
  • Investigation costs related to threats toward your business for future data breaches.

Third-party coverage insures your business against losses that third parties associated with your business have incurred due to a directed cyber event. This may include:

  • Coverage for lawsuits or settlements resulting from a data breach.
  • Coverage against claims for negligent acts, errors, or omissions.
  • Cost to respond to government queries into cyber attacks. This can be especially important if there is a need to retain legal, technical, or forensic professional support.
  • External communications costs (notifying customers, clients, employees, etc.)
  • Public relations, advertising, or crisis management responses from the data breach.
  • Liability costs associated with a breach of employee or customer privacy.
  • Ongoing costs for credit or fraud monitoring.

The Difference Between Cyber Liability and Data Breach Insurance

If you’re considering cyber liability insurance, you probably should be aware that there is a difference between that kind of a policy and a data breach insurance policy.

They’re similar, and both offer some of the same benefits, but they have certain limitations as well.

Data breach insurance helps your business respond if there is a PII loss (Personal Identifying Information) or PHI (Personal Health Information). This may happen if a hacker breaks into your network or an employee accidentally loses their laptop containing sensitive information.

Data breach insurance will help pay for notifying customers, employees, and other impacted parties. This can extend to hiring a public relations firm to manage crisis communications and messaging. It also provides coverage so that you can offer credit monitoring services to potential data breach victims.

Policies can be enhanced by adding riders such as business income and extra expense coverage, prior acts coverage, and extortion coverage for times when your data may be held for ransom.

As you can see, there’s overlap, but you should at least be aware that both types of policies exist. Be sure to question your insurer if they carry both so that you fully understand the coverages and exclusions.

How Much Does Cyber Liability Insurance Cost?

The short answer is…it depends.

There are several variables to consider when putting together a policy. These include:

  • Coverage limits. The more complex your coverage needs are, the more you’ll have to pay. If you store a lot of data, or you’re a larger, more established business with multiple servers or other data points of contact, you’ll pay more.
  • Your industry. If you run your business primarily online and face more threats, you’ll be deemed a more significant risk and pay a higher premium. Healthcare and accounting businesses tend to store the most sensitive and private information, so they are also considered at more risk and will also pay more for coverage. Companies that also engage in many credit and debit transactions or store personal information such as Social Security numbers or birth information are considered to be at more risk.
  • Who has data access? If you limit who has access to your electronic records, perhaps only to senior employees or other restricted classes of employees, you’ll be considered less open to breaches, and your premium should be less.
  • Existing data security measures. Just like a good driver policy, if you already have things like antivirus software or network firewalls in place, you might be able to negotiate a lower premium.
  • Claims history. If you have a bad track record of data security, and that’s reflected by claims you’ve made in the past, you might be subject to a higher premium.

According to insurance industry statistics, in 2019, the average cost of cyber liability insurance in the United States was estimated to be $1,501 per year for $1 million in liability coverage, with a $10,000 deductible.

The average annual premium for a cyber liability limit of $500,000 with a $5,000 deductible was $1,146. The average annual premium for a cyber liability limit of $250,000 with a $2,500 deductible was $739.

You’ll need to check with your carrier to define your needs so that you can get an accurate quote for your unique situation.

Final Thoughts

If you want to do some research, start by talking with your insurance agent who will provide valuable advice and answer questions you’re sure to have regarding coverage and costs.

You can also do some digging online on your own. Take a look at some of the industry leaders who offer cyber security insurance such as AIG, Travelers, The Hartford, Liberty Mutual, and others.

As cyber security insurance becomes more of a mainstream business issue, there are several general insurance industry articles that are excellent sources of information as well.

Filed Under: Security

by

Maintaining Cybersecurity in a New Work-at-Home World

Maintaining Cybersecurity in a New Work-at-Home World

You can’t deny that 2020 has upended every part of our lives, including how we work.

Working at home was already a trend before the pandemic hit. Companies are now treating this trend as a new way of doing business, and with that come many new issues.

An area that cannot get overlooked is making sure workers have the appropriate security tools and safeguards in place to protect themselves and their companies while working remotely. And, while most companies work electronically, remain vigilant to secure assets on paper.

A reshuffled working world has created new kinds of cyber challenges and vulnerabilities that must be addressed. Cyber threats are real, and there are a lot of bad actors who are always looking for weaknesses they can exploit.

Fortunately, every business owner and work-at-home employees can take steps to become a harder target for criminal activity.

20 Tips You Take to Safeguard Your Cyber Assets

  1. Educate yourself. Personal computers not controlled by a company may lack the necessary safeguards to protect against cyber threats. Also, employees may not understand certain actions, such as opening a suspicious file, could create a security breach. Employees may also not have adequate anti-viral software or may not erase sensitive company information from personal devices. It’s up to both the employer and the employee to learn and engage in best practices in these areas. New policies governing work-at-home cyber protection may need to be created.
  2. Create a secure technical infrastructure. To create a work environment that protects a company’s assets and employee’s actions, it may be necessary to upgrade or install a new cyber secure system that allows staff to safely work remotely.
  3. Understand that employees may be “patching” workarounds to maintain productivity. There’s a lot of pressure on employees to perform during the pandemic, and some enterprising employees may create their ways of maximizing productivity. For example, this may involve transferring company data onto personal devices which could create security breaches. Policies and protections must be put in place to ensure the level of security is not compromised.
  4. Implement safeguards that prevent employees from transferring company data while they are connected to the company’s network. Double down on these efforts by also investing in data leak monitoring software.
  5. Create a detailed policy that clarifies how employees should handle company information loaded onto their personal computer. As an alternative, a company may provide employees with work computers or laptops with cyber safeguards already installed.
  6. Review and/or update all anti-virus protection for work-related computers. Many times, these updates are pre-programmed and automatic when new updates are created. Don’t be cheap when it comes to cybersecurity, either. You’ll want software that is equipped to offer automated remote working security against several kinds of threats, including:
    • Zero-day attacks
    • Malware, spyware, and viruses
    • Trojans and worms
    • Phishing scams, including those sent via email
  7. Filter out unauthorized or unnecessary access to the company’s network. Limit user privileges and restrict administrative access to a small group of employees.
  8. Discourage employees from using public Wi-Fi networks, which could provide easy access entry points for hackers.
  9. Work-at-home employees need to keep all family members away from their work-related computers. There is a greater chance that children will hop on the computer in cramped quarters and could create havoc for the worker.
  10. When participating in teleconferences, consider investing in a sliding webcam cover. Hackers have learned how to access webcams without permission, compromising security and privacy. Webcam attacks are a real threat, and hackers may view sensitive documents in the home workspace. Covers prevent this from happening. Also, some videoconferencing software has a “blur background” feature to prevent others from spying on objects in a home workspace.
  11. Create a strong company Virtual Private Network (VPN). When more remote computers than ever are connected to company resources, a strong VPN is a crucial safeguard against back door hackers. Be sure to use the strongest possible authentication method, perhaps by using smart cards. Enhance the encryption method for VPN access. Make sure employees update and change passwords regularly. Also, make sure employees are logged on via secure networks.
  12. Use a cloud or server storage as a centralized storage solution. It’s a lot safer than storing files locally and creates a safer backup solution to protect against compromised, lost, or destroyed files. These storage solutions also have firewall protections built-in for an added layer of security.
  13. Confirm the security of third parties. Most organizations use contractors or vendors to keep their operations running. Often that involves sharing and integrating information and data. At the very least, government agencies and tax authorities must be accessed at some point or another. When organizations assess which controls must be extended to employees to secure new work-from-home protocols, they should do the same for third-party users and connections. If third parties cannot demonstrate adequate cybersecurity measures, consider limiting or suspending interaction until they can.
  14. Home networks must be secured. Creating a strong and unique password, changing the SSID, and limiting access to specific MAC addresses are steps you can take to ensure the wireless network is protected.
  15. Strengthen potentially weak passwords. The Federal Trade Commission recommends: “Use passwords on all your devices and apps. Make sure the passwords are long, strong, and unique. Use at least 12 characters that are a mix of numbers, symbols, and capital and lowercase letters.”
  16. For work-at-home employees who have customer account or banking responsibilities, extra care should be given to maximizing online banking activities. Use only credited software and services to handle funds. Only use platforms and software you are familiar with. If you’re unsure about a particular type of transaction, ask questions first until your concerns have been addressed. When accessing a banking website, make sure you are logged on via a Secure Hypertext Transfer Protocol. This means the URL should include https:// rather than just http:// at the beginning. You should also see a lock on the left of the URL bar of most internet browsers, indicating that website has an authenticated security certificate. Fraudsters may trick at-home employees through email, social media, or over the phone. Be stingy with giving out any banking information whatsoever.
  17. To protect your company, ensure work-at-home employees have the best tools possible. This may involve providing stipends or allowances to purchase approved hardware and software to upgrade as needed.
  18. Make sure incident-response protocols are in place. When cyber breaches occur, employees must know how to report them and what immediate steps to take. Speed is the key to minimizing potential damage inflicted on an enterprise. Redundant systems should also be in place and ready to act to minimize disruptions to normal business operations.
  19. Do not be pennywise and pound foolish. It may cost a bit more to make sure at-home workers have a secure system but consider the alternative if they are breached.
  20. Be sure email security is protected. Email is still a primary form of communication, but this form can also be easily hacked and compromised. Phishing scams are as prevalent as ever. To protect against email attacks, do the following:
    • Make sure emails can only be securely accessed via a company’s VPN. This creates an encrypted network connection that authenticates the user and/or device. It also encrypts data in transit between the user and your services.
    • If you already use a VPN, make sure it is fully patched.
    • Staff is more likely to have their devices stolen (or lose them) when they are away from the office or home. Make sure staff devices encrypt data while at rest. This protects email data on the device if it’s lost or stolen. Most devices have built-in encryption, but it still needs to be turned on and configured.
    • Instruct employees how to spot phishing attacks.

Extend Security Policies to Other Types of Records

Even with more robust technology controls and investments in security and infrastructure, employees working from home must still exercise good judgment to maintain information security. This also includes paper security.

Work-at-home employees need to make sure they have access to shredders at home or that they can access shredding bins in their offices onsite as needed. Depending on the nature of the business, other measures for hard file protection should be in place. Any secure document policy should go beyond the cyberworld and extend to paper and computer drive storage issues.

It’s incumbent for employers to set norms for the retention and destruction of physical copies, even if that means waiting until the organization resumes business as usual.

Filed Under: Security

by

Make Sure Your Old Hard Drives are Properly Destroyed: Hard Drive Destruction FAQs

Make Sure Your Old Hard Drives are Properly Destroyed: Hard Drive Destruction FAQs

Data is the lifeblood of just about every American business and, unfortunately, it attracts the unwanted attention of thieves who will try to steal private information and use it for illegal gains.

The sensitive nature of data extends far beyond its useful business life. Information stored on hard drives has the possibility of lasting forever unless you take appropriate steps to destroy it when the data is no longer needed.

You may be tempted to go cheap or do it yourself, but for maximum protection and full peace of mind, you should consider hard drive destruction as the most effective means of data protection.

What is hard drive destruction?

The hard drive is manually destroyed by a mechanical device ensuring the data cannot be recovered or stolen. The hard drive is transformed from a single platter where data is stored and turned into tiny particles. Think of it in much the same way that a woodchipper works on tree branches (this is true for shredding only).

Hard drive destruction extends to just about any type of sensitive electronic media, including:

  • Computer Hard Drives
  • Compact Disks
  • Floppy Disks
  • USB Drives
  • DVDs
  • Credit Cards
  • Platters
  • Microfilm
  • X-rays
  • Photographs
  • Videotapes
  • Transparencies

Hard drive are often destroyed by shredding, similar to how a household paper shredder operates, or by crushing/punching which creates a giant hole(s) punched into the middle of the hard drive, destroying the delicate magnetic surface that contains any sensitive information.

Can you successfully destroy your own hard drive?

You can try, but there will always be the nagging possibility that you will not be successful.

Simply deleting files is not enough, nor is erasing the hard drive with a program that does not meet industry standards for data destruction.

If you want to get more medieval and think you can smash your hard drive into pieces with a hammer, think again. It is still not a fool-proof method (although you may feel better taking some of your aggression out on a defenseless piece of computer hardware).

Tossing the hard drive in the trash and hoping it winds up in a landfill or recycling it at one of those computer recycling drives will also leave you and your data vulnerable to theft and misuse.

Taking matters into your own hands could also land you in trouble with the U.S. Environmental Protection Agency. Computer components are toxic and should be disposed of properly.

There is more to it than first meets the eye, which is why data and hard drive destruction are always best left to the professionals. That means you should only work with a vendor who follows NAID certified best practices.

What is NAID AAA certified destruction?

The National Association of Information Destruction (NAID) is the largest international certification body for information and data destruction. The NAID is an independent auditor that checks a shredding company’s compliance in 22 areas.

Using an NAID compliant vendor is not only a good idea, in many cases NAID AAA Certification is required by hundreds of government offices and thousands of private contracts.

The organization verifies secure data destruction companies’ services’ compliance with all known data protection laws through scheduled and surprise audits by trained, accredited security professionals, fulfilling customers’ regulatory due diligence obligations.

As part of NAID AAA Certification, a vendor will record the serial number of each hard drive that is shredded and give a NAID Certificate of Destruction to the customer, providing proof that the hard drive was destroyed according to regulations.

The lesson here is that you should never just accept a vendor’s word that a hard drive has been destroyed without written documentation. You need the protection that a paper trail will provide if there are issues later.

What happens when you do not follow best practices?

In a study conducted by the NAID, 40% of used electronic devices sold on the secondhand market contained Personally Identifiable Information (PII). So even if you think you have wiped your hard drive clean, there is an almost 1 in 2 chance that you have not.

The bottom line is, if you value your data, destroy your hard drives following industry best practices.

What are some of the legal issues that could arise by not properly disposing of data?

If you are negligent and do not dispose of your hard drive the right way, you could run afoul of several laws that protect consumers from data breaches.

Perhaps the most well-known of these is the Federal HIPAA law.

The Health Insurance Portability and Accountability Act of 1996 created security standards to establish measures ensuring the security of healthcare information maintained by healthcare providers, healthcare institutions and health insurance companies.

The Gramm-Leach Bliley Act (GLB Act) created significant restrictions on the use of customer information in the financial industry (i.e., insurance, banks, stockbrokers, mortgage, escrow, lenders, etc.)

The Fair and Accurate Credit Transactions Act (FACTA) established a national system of fraud detection so victims can alert all three major credit rating agencies with a single phone call.

The U.S. Supreme Court also ruled that dumpster diving is not illegal. As a result, it has been a common method for stealing sensitive data for quite some time now.

What should I do with the hard drive until it’s ready to be shredded?

Many companies are required to maintain data for a certain period, either due to company policies or legal compliance. You may be tempted to take full and old hard drives and stick them in a “secure” storage facility onsite. But if you do, you are still leaving your company vulnerable to a significant data breach.

When you store old hard drives and data onsite, you are creating an attractive target for criminal activity. Instead, you need to find a secure off-site location and limit access.

Is it better to have hard drives shredded onsite or offsite?

Either is acceptable. What you really need to be concerned with is the level of chain of custody practices. Chain of custody is defined as the chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence.

Many vendors will come to your place of business and allow you to witness the actual destruction of the hard drive or other electronic media. Others will securely transport hard drives to a remote location where they will be securely shredded. Generally, the hard drives are placed in a secured and locked container for transport before they are destroyed.

Onsite shredding can take a little more time, so it is slightly more expensive. Dropping your hard drives off at a shredding facility or having them transported is generally cheaper.

What happens to the hard drives pieces after they are shredded?

Recycling is an important part of hard drive shredding. To prevent environmental pollution and associated health hazards, shredded pieces are recycled using a raw metal extraction process that creates new metal and plastic products.

Filed Under: Data Destruction

by

Guard Against These Consumer Scams

Guard Against These Consumer Scams

Scammers are everywhere, and they’re continually coming up with new and more sophisticated ways to separate you from your money.

Recognizing this growing threat to consumers, in 2019 the federal government earmarked $15 billion for cybersecurity issues spread out across more than 70 agencies. The funds are being used to stop government security breaches, ransomware attacks, and various types of fraud that can impact millions of Americans.

This doesn’t even come close to fully addressing the problem, but it does help to point out the magnitude of a rapidly growing problem.

Vigilance is the Key

Scammers can come at you a thousand different ways. Your identity can be stolen as part of a significant data breach. A con man could rip you off in a Craigslist transaction. A thief could insert a card skimmer in the pump at your local gas station. A phony online retail site could induce you with a “too good to be true” deal that you fall for.

That’s why you need to adopt an overall philosophy about how you protect your identity and your financial information. Develop a set of guidelines that you won’t violate under any circumstances. Don’t give out personal information over the phone. Do some digging before you buy online. Make sure the government agency or company you’re dealing with is who they say they are.

Also, check your credit report regularly and be on the lookout for bills you don’t recognize that come to you in the mail.

If you set your radar on high and let your intuition play a part in protecting you, you’ll be in far better shape against scammers who want to victimize you.

Be on Alert for These Consumer Scams

Let’s take a closer look at some of the consumer scams you could encounter.

Phishing. Phishing involves a scammer passing themselves off as a trusted entity such as a bank or mortgage company. Their goal is to mislead you into passing your personal information to them, which they’ll then use to commit crimes.

Malware. If you visit a lot of websites, sooner or later you may fall prey to malicious software loaded on your computer. The software will scan your entire hard drive for information that could end up costing you a lot of money.

The Prepayment Scam. You’re asked to pay upfront fees to process contest winnings, loans, grants, credit cards, or an investment.

The Charity Scam. You’re contacted by phone, online, by email, or regular mail, asking you to donate to a charity. This is particularly prevalent after a large natural disaster such as an earthquake or hurricane. Stick to mainstream charities such as the American Red Cross or those that have been thoroughly vetted. If you don’t recognize the organization, do your homework first.

The Employment Scam. You’re looking for a job, and you’re extended an offer, but you must first pay for job-related expenses. You could be tricked into buying products up front that you would sell once you begin the job.

Extortion. This is particularly heinous because it involves threatening your life or the lives of your family members. Vulnerable populations are often at risk, including seniors and undocumented immigrants, among others.

Identity Theft. Thieves pose as you using your personal banking information such, Social Security number, or credit card info. These types of identity theft are far reaching and include opening new accounts, making purchases with your information, obtaining medical coverage, filing tax returns, and countless other ways.

The Military Scam. Fraudsters may pose as a member of the armed forces and solicit you for donations for their fake cause.

The Lonely Hearts Scam. With the rise of online dating, you could meet someone online, fall prey to their smooth-talking charms and end up having your bank account emptied before you know it.

The Social Media Scam. Hackers will access your personal information on Facebook, Twitter, Instagram, and other platforms and use what they find to rip you off. They may also be able to access personal information from the people in your network or make highly targeted pitches for money to friends and family.

Telemarketing Scam. If you don’t screen your calls, unscrupulous telemarketers could contact you with “free if you buy today” or “extremely limited time” offers. This high-pressure squeeze tactic can have the unsuspecting transferring money or giving up personal information.

The Children’s Social Security Card Scam. Thieves can obtain the Social Security numbers of children who don’t have any credit history. Their credit reports are seldom monitored, and a scammer can do a lot of damage before any irregularities are discovered as the child gets older.

The Mortgage Scam. Distressed homeowners are often targeted with foreclosure rescue scams, phony loan modifications, and equity skimming. And worse, actual real estate and mortgage professionals may take part due to their intimate knowledge of the home loan industry. It’s easy to get fooled.

Debt Collection Scam. A fraudster may call you posing as a collection agency to collect a debt that you may or may not owe. They may threaten you or put pressure on you threatening legal action to get you to reveal your account information as a means of settling.

What to do if You’ve Been Scammed

Report it. Don’t feel embarrassed if that there’s no hope of recovering what you lost. Scammers hope you’ll think that getting your money back is futile. Don’t fall into this trap. Reporting a scam helps law enforcement officials establish accurate statistics. In turn, this provides direction on where to devote resources. Spotting trends also makes it easier to alert other agencies on what to look out for. Many criminal enterprises extend throughout the country and internationally. If you’re not sure where to start, call your local police department for direction.

Match the enforcement agency to the crime. Some scams are local in nature; others can have far-reaching geographic implications. For scams involving goods and services, start with your state attorney general’s office or state consumer protection agencies. If you’re a scam victim that violates federal law, then you can go to a national enforcement agency. Start with the Federal Trade Commission or the FBI’s Internet Crime Complaint Center. If you are a victim of identity theft, the FTC has a separate website to assist you. For financial crimes, go to the Financial Industry Regulatory Authority to file a complaint.

Accept that you are a crime victim. Do not beat yourself up for feeling gullible. Highly sophisticated thieves have scammed millions of Americans. Focus on taking productive steps going forward, including shoring up access to your personal information. Become a hard target, and it’s more likely bad guys will move on. Work with friends and family to make sure they don’t become victims as well.

Filed Under: Security

  • « Previous Page
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • Next Page »

Free Quote

Testimonials

"Thanks, John. Your company is first rate and I have already recommended it to several friends and relatives. Keep up the good work!"
Mike W.
"Thank you John. The service provided by SDD was outstanding. You provided everything that was promised and at the designated time arranged and I might add that your man that handled the job couldn't have been nicer or accommodating.. It is rare to find businesses that follow through with their promises. We appreciated doing business with you and would recommend SDD to anyone needing this service. Thank You!"
Joe B.
Distribution Sales, Leviton Manufacturing
"John did a great job! Friendly, answered all my questions, very helpful. Thanks for providing good service!"
Lana E.
Alton, IL
"We had a problem when our previous shredding company raised their prices sky-high. When we called SDD; John gave me a quote over the phone and came out the next day. They performed the same size job in about half the time, … at a lower price! We would recommend them highly to anyone who needs shredding."
Chris K.
Missouri Insurance Exchange
"It gives our company "peace of mind" to depend on the professional & personable, fast & efficient shredding services of Secure Document Destruction of St. Louis. I would highly recommend SDD STL. The service and price is exceptional!"
Laura K.
La De Da Entertainment
"Secure Document Destruction is AWESOME!! John always takes great care of us, the service is fast and reliable; John, our service/driver is great too. Looking back, I wish I would have switched to SDD sooner! 5 out of 5 stars!"
Tracy T.
Central Bank of St Louis
"Thank you! Everything went very well. Great customer service from beginning to end!! I am sure we will be in touch for future clean up projects."
Amy F.
Oasis Institute
"THANKS!!!! My house feels better with ALL that paper gone! The service was excellent!!! Thanks again!"
Kathy Ames
Desoto, MO
"SSD provided the shredding services for my business when I closed in 2013 and again in 2024 when I called on them to shred the last of the documents that had been held in storage. They were friendly, honest and very helpful throughout the difficult process which was made easy with their professionalism over the years I dealt with them and I highly recommend them."
Bob L.
Rock Hill, MO
"You and John are wonderful people and I thank you so much for working with me. God Bless you both."
Laura E
"Your service/driver guy, JP just came and did our pickup. He is such a nice, friendly person and so are you. It is great doing business with you guys."
Berry Silberberg Stokes PC

Contact Us

Secure Document Destruction of St. Louis
2517 Adie Rd.
Maryland Heights, MO 63043
(Appointments only at this location. Please call 314-795-0004)

314-795-0004
Fax: 618-281-7153
In Illinois: 618-281-3245

Email Us

About Us

  • Email
  • Facebook
  • LinkedIn

Services

Onsite Shredding Service
Business Shredding Service
Residential Shredding Services
Hard Drive Destruction
Data Destruction
Routine Service
One-time or Purge Service
Document Shredding Services
Mobile Shredding Services
Document Destruction Services
Residential Shredding Services
Medical Records Shredding

Categories

STLCHAMBERLOGONAID AAA LogoOFallon-Chamber-Logo

Review Us

  • Business Shredding
  • Residential Shredding
  • FAQs
  • Blog
  • Contact Us

Copyright © 2025 · Secure Document Destruction