Page not available in your preferred language
The branch that you searched for does not have a page in your preferred language. Would you like to visit the branch page on the #CODE# site?
Protect your business from an information breach with a regularly scheduled paper shredding service.
Storing or just erasing obsolete hard drives could cost you millions in a data breach. Let us securely destroy your electronic data.
Boxes and filing cabinets stuffed with old documents? Get our one-off document destruction service.
Confidential information can be found on more than paper: we destroy CD-ROMs, USB drives, and data tapes.
From uniforms to identity cards, speciality shredding destroys information wherever it’s found.
Get a Quote
Back To Resource Centre
In this issue of Securing the Future, we share best practices for document destruction. We identify three key guidelines to follow and how they will help to keep your customer, employees and business secure.
Welcome to the third issue of Securing the Future, an e-newsletter from Shred-it document destruction. Focusing on the issues of information security, privacy and compliance, this newsletter shows how these issues affect your organisation and your customers and, most importantly, how you can best address them.
All organisations possess confidential information about their own operations and about their customers which increases the risk of becoming a target for identity theft and fraud. According to Ernst and Young’s 2013 Global Information Security Survey1, they found that despite economic pressures, organisations are spending more to address information security challenges, including those related to delivering security in a borderless environment. 43 per cent of the survey respondents indicated that their annual investment in information security is increasing.
“Accessibility to documents that contain confidential data poses a serious threat to the business and reputational integrity of any organisation,” says Michael Skidmore, Chief Security Officer at Shred-it. “It’s only common sense that organisations should do what it takes to prevent any compromises of their information, identifying security loopholes and implementing effective and reliable measures to address them.”
Secure document destruction is one of these measures. Based on its 25-plus years of experience in this business, Shred-it shares some tricks of the trade and practical tips on how to make sure your confidential information stays confidential.
Best practices in document destruction can be summed up in three general guidelines that are easy to understand and implement:
When implemented in a strategic and integrated method, these principles will dramatically increase
the security of your documents, your business and your customers. But let’s look at them one at a time.
A “shred-all” policy is one of the most critical steps you can take towards total information security. It means a company-wide commitment to shredding all documents on a regular basis. Standardising document destruction procedures will allow your organisation to align its rules and regulations with its information security goals and needs.
A shred-all policy is a way to make sure there are no leaks — intentional or unintentional — of your organisation’s sensitive information to outside sources, potentially including criminal groups that feed on this sensitive information to commit fraud, including identity theft crimes. In turn, regular disposal of paper waste means it does not accumulate in an uncontrolled manner, reducing the potential for security breaches brought about through negligence or malicious intent.
Since the Information Commissioner’s Office (the UK government’s Data Protection watchdog) had its powers increased in 2010, it has issued over £6 million in fines for serious breaches of the Data Protection Act. Some estimates have put the total cost of a data security breach — including reputational damage and loss of business — at over £2 million per incident2. All of this leads to the conclusion that information disposal is already one of the largest concerns to consumers and businesses, and avoiding the consequences of improper disposal is of major importance when selecting a partner to process and destroy the information.
Tips for successfully implementing a shred-all policy:
Full cooperation by your employees is paramount, but a word of caution is in order. While most security threats may be perceived to be outside of your organisation, don’t overlook the potentialfor internal threats. Your staff may actually be one of them.
You may think you are doing your part for the environment by throwing paper documents into the recycling bin. However, are you recycling in a security-conscious manner? Remember: loose paper is often unattended before it has been recycled, and it can leave your organisation vulnerable to potential security breaches. For example, unguarded paper in recycling containers can be misplaced or stolen. Or, it can simply fall out of the recycling collection vehicle onto the street.
There is a way to meet both needs — serving the environment and following responsible business practices — by recycling documents while also keeping your customers’ information confidential. You can achieve both goals by outsourcing document destruction to a reliable service provider with high security standards and a strong environmental record.
You might find it interesting to know that, working with Shred-it, organisations save one tree through recycling every time they fill up two Shred-it security consoles with paper. Shred-it even offers customers an annual Environmental Certificate, which states how many trees they saved. What’s more, using recyclable, biodegradable, hydraulic fuels for its vehicles, Shred-it reinforces its commitment to continuing to improve its environmental practices.
Implementing all these measures, you’ll come a long way toward the ultimate goal — total security
of your customer, employee and business information. However, one question remains — should
you hire a third-party provider or try pursuing these measures on your own? Here are a few pointers to help you ponder this question:
Shred-it’s on site locked document storage consoles ensure that once documents are ready to be discarded, they remain secure and protected until Shred-it personnel arrive. Those documents are then moved to a Shred-it truck, following a secure chain of custody. There, at your location, they are fully shredded, leaving only small confetti-like pieces of paper that cannot be reassembled. Shred-it completes the process, issuing a Certificate of Destruction to provide verification that documents have been securely destroyed.
By outsourcing your document destruction needs, you can gain access to years of experience and comprehensive expertise of a professional document destruction service provider. In doing so, you significantly reduce the risk of costly and damaging mishaps or accidents, potentially leading to security breaches, data protection violations and identity theft and fraud.
To conduct your own information security self-assessment, Shred-it has developed an online survey to help businesses better understand security gaps. You can access it via the following link: shredit.co.uk/information-security-best-practices-and-checklist
You can also visit Shred-it on Facebook and LinkedIn or follow us on Twitter @Shredit_UK.
Fill out the form or call 0800 197 1164 to start protecting your business today!