Category: Uncategorized

Proton Data Security Blog

What to Do After A Data Leak: 5 Critical Steps

What to Do After A Data Leak: 5 Critical Steps

What to Do After A Data Leak: 5 Critical Steps No matter how many security procedures you follow, a data leak can still happen. Make sure you’re prepared in the event of an emergency with our five key steps. There were almost 1600 data breaches in the United States during 2017. Despite increased security measures, […]

Read More

4 Mistakes to Avoid When Using a Hard Drive Shredder

4 Mistakes to Avoid When Using a Hard Drive Shredder

Using a hard drive shredder comes with a lot of responsibility, so make sure you are following the right protocol. Click here for four mistakes to avoid. Anyone who works with sensitive data understands the importance of protecting your clients. Even though the use of paper is still perhaps frighteningly popular, the 21st century has […]

Read More

New NSA Listed Crushers

New NSA Listed Crushers

After secure degaussing, crushing is an excellent method of physically destroying a hard drive, rendering its data irrecoverable. The PDS-75, PDS-100 & PDS-125 crushers bend hard drives 90 degrees, which destroys the internal components and platter. These machines are so effective that they have recently been added into the Evaluated Products List (EPL) for high […]

Read More

Pin It on Pinterest