The Hidden Cracks in Workplace Confidential Document Security

confidential-file1

You have buttoned down your IT security, so you think you can breathe easy. But hacking is about strategy, not just technology. Paper-based identity theft remains a threat, even to companies with sophisticated digital defenses. While the focus on digital security grows, identity thieves, and even corporate spies, are finding easy access to neglected physical document security.

Off-site services and security breaches

Off-site shredding services are an easy path for identity thieves. Getting into legitimate off-site shredding companies, thieves can show up at your office and wait for you to hand over your confidential documents.

On-site keeps it confidential

By maintaining on-site shredding you can ensure that private information, stays private. If the convenience of off-site services are still a consideration over security, on-site automatic shredders are the perfect choice. They make on-site security management even easier, allowing hands-free, walk-away shredding a convenience, without compromising confidential information.

Corporate spies with low-tech strategies

Corporate spies will find any possible way to get to key classified documents. If they can’t get this info through digital hacking, they can go low-tech just as easily.

Making shredding procedures a part of your office policy.

What spies are looking for, and what you should shred at the office:

Company Phone Books

Can give a hacker names and numbers of people to target and impersonate.

Organizational charts

Contain information about people who are in positions of authority within the organization.

Memos

Provide small amounts of useful information for creating authentic looking fake memos.

Policy manuals

Show hackers how secure and insecure a company really is.

Calendars

Can tell a corporate spy which employees are out of town at a particular time.

Incidents of off-site shredding security breaches are showing up in the news: Document Shredding Company Employee Eyed in ID Theft Ring…Read More

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s