{"@context":"https:\/\/schema.org\/","@type":"Blog","@id":"https:\/\/www.protondata.com\/blog\/#Blog","headline":"BLOG","description":"Brilliant Data Security Solutions","url":"https:\/\/www.protondata.com\/blog\/","hasPart":[{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/cloud-complexity-puts-importance-degaussing-microscope\/","headline":"Cloud complexity puts importance of degaussing under a microscope","url":"https:\/\/www.protondata.com\/blog\/data-security\/cloud-complexity-puts-importance-degaussing-microscope\/","datePublished":"2017-05-11","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/cloud-complexity-puts-importance-degaussing-microscope\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/05\/Physical-destruction-isnt-enough-to-erase-information-on-a-hard-disk_2410_40157495_0_14095016_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/05\/Physical-destruction-isnt-enough-to-erase-information-on-a-hard-disk_2410_40157495_0_14095016_500.jpg","height":334,"width":500},"wordCount":1007,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/3-layers-physical-access-control-mean-decommissioning\/","headline":"3 layers of physical access control and what they mean for decommissioning","url":"https:\/\/www.protondata.com\/blog\/data-security\/3-layers-physical-access-control-mean-decommissioning\/","datePublished":"2017-05-03","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/3-layers-physical-access-control-mean-decommissioning\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/05\/Degaussers-allow-organizations-to-incorporate-access-control-processes-into-their-decommissioning-strategies_2410_40157287_0_14115352_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/05\/Degaussers-allow-organizations-to-incorporate-access-control-processes-into-their-decommissioning-strategies_2410_40157287_0_14115352_500.jpg","height":324,"width":500},"wordCount":923,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/nsa-disk-degaussers-mean\/","headline":"The NSA, disk degaussers and what they mean for you","url":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/nsa-disk-degaussers-mean\/","datePublished":"2017-04-03","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/nsa-disk-degaussers-mean\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/04\/Our-degaussers-are-certified-for-use-when-data-destruction-is-a-matter-of-national-security_2410_40155779_0_14117105_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/04\/Our-degaussers-are-certified-for-use-when-data-destruction-is-a-matter-of-national-security_2410_40155779_0_14117105_500.jpg","height":332,"width":500},"wordCount":1198,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/dont-underestimate-insecure-physical-assets-can\/","headline":"Don&#8217;t underestimate how insecure physical assets can be","url":"https:\/\/www.protondata.com\/blog\/data-security\/dont-underestimate-insecure-physical-assets-can\/","datePublished":"2017-03-31","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/dont-underestimate-insecure-physical-assets-can\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/03\/Protecting-physical-assets-such-as-hard-drives-is-a-critical-component-of-data-security-strategies_2410_40154808_0_14121338_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/03\/Protecting-physical-assets-such-as-hard-drives-is-a-critical-component-of-data-security-strategies_2410_40154808_0_14121338_500.jpg","height":416,"width":499},"wordCount":1163,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/3-reasons-destroy-data-house\/","headline":"3 Reasons to Destroy Data In-House","url":"https:\/\/www.protondata.com\/blog\/data-security\/3-reasons-destroy-data-house\/","datePublished":"2017-02-22","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/3-reasons-destroy-data-house\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/protonsiteadmin\/#Person","name":"ProtonSiteAdmin","url":"https:\/\/www.protondata.com\/blog\/author\/protonsiteadmin\/","identifier":1,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/f892abcc032eee14738cab0f8a79f5116d70bcb647eb5e2655f162d4f14aba64?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f892abcc032eee14738cab0f8a79f5116d70bcb647eb5e2655f162d4f14aba64?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/08\/Information-on-employees-customers-and-private-operations-are-all-housed-on-internal-computer-systems-But-just-because-the-data-is-locked-away-doesnt-_2410_40132303_0_14120107_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2016\/08\/Information-on-employees-customers-and-private-operations-are-all-housed-on-internal-computer-systems-But-just-because-the-data-is-locked-away-doesnt-_2410_40132303_0_14120107_500.jpg","height":334,"width":500},"wordCount":44,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/case-outsourcing-asset-disposition\/","headline":"The case against outsourcing IT asset disposition","url":"https:\/\/www.protondata.com\/blog\/data-security\/case-outsourcing-asset-disposition\/","datePublished":"2017-02-21","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/case-outsourcing-asset-disposition\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/01\/At-some-point-in-time-every-organization-needs-to-get-rid-of-old-hard-disk-drives-flash-drives-or-other-electronics-that-once-stored-confidential-info_2410_40150890_0_14117498_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/01\/At-some-point-in-time-every-organization-needs-to-get-rid-of-old-hard-disk-drives-flash-drives-or-other-electronics-that-once-stored-confidential-info_2410_40150890_0_14117498_500.jpg","height":334,"width":500},"wordCount":597,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/ssd-flash-media-destruction\/new-2-tb-super-thumb-drives-spark-need-ssd-shredders\/","headline":"New 2 TB super thumb drives spark need for SSD shredders","url":"https:\/\/www.protondata.com\/blog\/ssd-flash-media-destruction\/new-2-tb-super-thumb-drives-spark-need-ssd-shredders\/","datePublished":"2017-02-02","dateModified":"2017-08-30","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/ssd-flash-media-destruction\/new-2-tb-super-thumb-drives-spark-need-ssd-shredders\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/01\/With-the-new-2-terabyte-super-thumb-drive-from-Kingston-hitting-the-market-soon-companies-will-want-to-take-one-extra-step-before-they-roll-out-a-mass_2410_40150541_0_14035645_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/01\/With-the-new-2-terabyte-super-thumb-drive-from-Kingston-hitting-the-market-soon-companies-will-want-to-take-one-extra-step-before-they-roll-out-a-mass_2410_40150541_0_14035645_500.jpg","height":347,"width":500},"wordCount":586,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/data-security\/well-trained-employees-best-defense-physical-data-breaches\/","headline":"Well-trained employees are the best defense against physical data breaches","url":"https:\/\/www.protondata.com\/blog\/data-security\/well-trained-employees-best-defense-physical-data-breaches\/","datePublished":"2017-01-26","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/data-security\/well-trained-employees-best-defense-physical-data-breaches\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2014\/08\/riskAssesment.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2014\/08\/riskAssesment.jpg","height":"130","width":"200"},"wordCount":613,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/top-5-industries-vulnerable-data-breach\/","headline":"Top 5 industries most vulnerable to a data breach","url":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/top-5-industries-vulnerable-data-breach\/","datePublished":"2017-01-25","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/top-5-industries-vulnerable-data-breach\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/01\/Data-breaches-continue-to-trend-upward-as-we-move-into-2017-but-the-industries-being-exposed-most-often-have-stayed-the-same-for-the-last-five-years-o_2410_40149907_0_14123525_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/01\/Data-breaches-continue-to-trend-upward-as-we-move-into-2017-but-the-industries-being-exposed-most-often-have-stayed-the-same-for-the-last-five-years-o_2410_40149907_0_14123525_500.jpg","height":334,"width":500},"wordCount":867,"keywords":null},{"@type":"Article","@id":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/new-computer-dont-throw-old-one-just-yet\/","headline":"New computer? Don&#8217;t throw the old one out just yet","url":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/new-computer-dont-throw-old-one-just-yet\/","datePublished":"2017-01-24","dateModified":"2020-05-13","mainEntityOfPage":"https:\/\/www.protondata.com\/blog\/degaussing-equipment\/new-computer-dont-throw-old-one-just-yet\/","author":{"@type":"Person","@id":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/#Person","name":"Proton Data Security","url":"https:\/\/www.protondata.com\/blog\/author\/datadestructionblogger\/","identifier":7,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd2e28f9d09f9b7e450d32e1b8ed5ac63ee6a1d855a61074efccf4153dba931b?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Proton Data Security","logo":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2015\/05\/wh-logo-02-schema-correct-size.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/01\/Perhaps-you-purchased-a-new-tablet-or-a-new-desktop-altogetherwhats-certain-is-that-you-just-punched-a-oneway-ticket-to-the-recycling-heap-for-your-ol_2410_40149694_0_14023728_500.jpg","url":"https:\/\/www.protondata.com\/wp-content\/uploads\/2017\/01\/Perhaps-you-purchased-a-new-tablet-or-a-new-desktop-altogetherwhats-certain-is-that-you-just-punched-a-oneway-ticket-to-the-recycling-heap-for-your-ol_2410_40149694_0_14023728_500.jpg","height":334,"width":500},"wordCount":822,"keywords":null}]}