With the rise of the internet, a lot of business is conducted online. These days, more and more employers are offering work-from-home options and working remotely has increasingly become the new norm.

A 2018 international workplace study surveyed more than 18,000 business professionals across 96 countries and found that 70 percent of employees are working at least one day a week outside of the office.

Having the option to work from home (or anywhere else in the world) not only provides flexibility, but it decreases missed work opportunities due to poor weather conditions or illness. 

While there are many benefits to working remotely, there are also increased chances of a data breach occurring. To prevent this, it’s important to be aware of how to protect yourself or your employees when working remotely.

 

Implement a Cybersecurity Policy

If your company offers the ability to work from home, or if you are considering it, make sure that you establish a cybersecurity policy. Employees need to understand that protecting company data is extremely important. 

Whether your business is big or small, a data breach can happen to anyone. As a matter of fact, small businesses are frequently targeted for data breaches. Often, small businesses believe that they won’t be targeted and that cybercriminals go after big businesses. According to a 2018 study, however, 58% of cyber attack victims were small businesses. 

The first step in creating a cybersecurity policy is to make sure each employee understands that data security is a priority. Some employees may be unaware of the importance of protecting their data or may assume that if they aren’t working with customer data, they don’t need to worry. Having a policy document to clearly outline all security measures employees must follow will ensure that employees will be on the same page. 

 

Limit Access

When everyone works in the same building, it’s a lot easier to be aware of who is coming and going and who has access to important files. When an employee works remotely, that could mean working at home, at a coffee shop or in an airport (if they travel for business). You never know who might glance over at their screen or try to gain access to their devices. 

What if your employee had access to confidential information and then their device was stolen?  Limiting access to documents and programs that are only relevant to the execution of their duties will help mitigate the risk. 

 

Password Protection

 Always make sure devices are protected with strong, unguessable passwords and are never left unattended. A lot of people use the same passwords across various accounts, but that puts you at risk if someone hacks into your account.

Employees should be advised to avoid opening any suspicious links or emails, otherwise known as phishing scams. Phishers commonly target employees by sending pop-ups and links. When the person clicks on the link, the device becomes accessible to the wrong person. Remaining vigilant and wary of emails with links and attachments you don’t recognize is essential for good online safety. 

 

Be Wary of Public Wi-Fi

Public Wi-Fi is extremely convenient, especially if you’re limited by data usage. One of the benefits of working remotely is that you have the ability to decide where you want to work: be it a coffee shop, a restaurant or a library. The problem with public Wi-Fi is that anyone is able to access it. The risk with that is that you may connect to public Wi-Fi, which is provided by an unknown server, so your data security is not guaranteed. Anyone is able to access public Wi-Fi, which means that hackers can, too.

Employees shouldn’t use public Wi-Fi to send confidential information unless it’s an emergency. 

 

Use Two-Factor Authentication

Two-factor authentication confirms a user’s identity by requiring a username and password and either requiring a pin number that was sent to the user’s phone or answering an additional question.

Two-factor authentication provides an additional level of security to give employers of remote workers peace of mind.

 

Encourage Staff to Bring Confidential Documents to the Office

While you may not be able to control where your employees work, you can encourage staff to bring in confidential documents to the office. 

Here at SafeShred, we offer a variety of document shredding services to fit your needs. From drop-off shredding services to off-site shredding services, we will ensure that your documents are destroyed securely and within compliance.

If you’re interested in learning more about our shredding services, contact us online or give us a call at 1-800-987-4733. 

read more

The holiday season is an incredible time of year: decorating the house with holiday ornaments, spending time with family, and indulging in decadent treats.

Arguably, one of the least enjoyable aspects of the holidays is the shopping.

Packed malls, struggling to find a gift, and spending money all contribute to a stressful experience, which is why more and more Americans are skipping the malls and shopping online from the comfort of home. During the 2019 holiday season, online and non-store retail sales are expected to grow 11% and 14% in comparison to 2018.

However, shopping online poses some risks.

During the holidays, people tend to make a greater number of purchases than the rest of the year. Also, because of the lengthy laundry list of tasks for the holidays, people often tend to be more distracted and are more likely to be hit with fraud.

Whether you’re shopping online or hitting the malls, here’s some tips to protect yourself this holiday season.

 

Update Software on Your Computer or Cell Phone

This tip is one of the easiest tips you can do, but it is often neglected or put off. While you may roll your eyes when you see the “update your software” notification come through, it is an easy line of defense against hackers. Software updates are often released as security measures. While it may be annoying to update your software consistently, it’s important.

 

Beware of Phishing Scams

When you’re scouring the web for deals on that one item your loved one really wants, it may be tempting to click on links that offer tremendous deals.

Doing so may come at a far greater price than originally intended.

Fraudsters will commonly set up fake websites, designed to look reputable, from which they send you an email with a link to the fraudulent site. This is known as phishing.

Some best practices to avoid phishing scams include:

  • Inspecting the link before clicking on it
  • Deleting any suspicious emails or offers that seem “too good to be true.”
  • Check to see if the page is encrypted before entering credit card details
  • Protect your computer by installing anti-malware and spyware software. Make sure it’s always up to date.

Even if an email looks real, don’t click on the links.

 

Don’t Use Public Wi-Fi For Purchases

It may be tempting to take advantage of the free Wi-Fi at the mall in lieu of using precious data, but it can pose some risks. Never use a public computer for online shopping and don’t use public Wi-Fi when entering credit card information. It may be tempting to browse your banking information while taking a break from shopping, but it enables thieves to easily intercept any data on a public network.

You can set up a virtual private network (VPN) on your laptop or your phone, which encrypts your connection while using a public network. Usually though, VPN’s aren’t free and require a subscription.

 

Only Use Credit Cards When Shopping Online

If you’re thinking about making purchases online with your debit card, think again.

Credit cards offer strong protection against fraudulent charges. Many credit cards also offer zero liability protection, meaning that you won’t have to cover the bill for fraudsters trying to make purchases with your credit card.

Some other benefits that credit cards offer are:

  • Virtual card numbers: Virtual credit card numbers are temporary numbers that can be used while shopping online. It’s a measure that helps protect your real account while shopping online. If a site has a disposable card number, it’s a lot more difficult for someone to access your credit card and make unauthorized purchases.
  • Account alerts: Signing up for text or email alerts to notify you if there’s unusual activity on your account.
  • Account lock: you can lock or freeze your account if your card gets lost or stolen.

Alternatively, if someone makes an unauthorized charge to your debit card, the amount you will owe depends on how quickly you report it. As the money is immediately taken from your bank account, it could take longer for you to get it back.

 

Check Your Statements and Credit Reports

Always make sure you frequently check up on your credit statements and reports, especially during the holiday season when you’re more likely to make purchases. Always report any suspicious activity.

Additionally, make sure you dispose of any letters or bank statements properly through document destruction services. It’s easy for someone to steal your identity if you don’t properly dispose of your documents.

At SafeShred, we offer shredding services to Los Angeles, San Bernardino and Orange County. Contact us today for more information or give us a call at 1-800-987-4733.

Here’s to a safe and happy holiday season!

read more

November 17th kicked off Internal Fraud Awareness Week, a global effort which seeks to reduce fraud by promoting anti-fraud awareness practices. The campaign began as an initiative to encourage business leaders and employees to reduce fraud through education and anti-fraud awareness.

Being aware of fraud scams is important because unfortunately, fraud isn’t going anywhere.

Small businesses, in fact, are frequently targeted by fraud. According to the Association of Certified Fraud Examiners (ACFE), businesses with less than 100 employees experience a median loss of $154,000. Surprisingly, this number is higher for smaller businesses than larger companies. Smaller businesses often lack the resources to implement internal checks and balances for their accounting systems, which makes them more susceptible to fraudsters.

Knowledge and awareness are key to the early prevention of fraud. Here are some simple measures you can take to protect yourself and your small business.

 

Password Protection

This may seem tedious, but with so many transactions taking place online these days, it’s necessary.

Most businesses conduct their work online, with employees having access to various avenues of technology. Implementing strong, unguessable passwords and locking all company devices is essential. Passwords that require you to change them every 60 days is best practice. Don’t duplicate passwords by using the same one for multiple accounts. This leaves you vulnerable if one of your accounts gets hacked.

 

Company-Wide Training

Business owners often forget that fellow employees are a large point of vulnerability. Payroll schemes occur twice as frequently in small businesses as opposed to larger companies.

However, with the proper training, employees can be an excellent line of defense. All employees should receive consistent training and regularly training about security updates.

Workers’ compensation fraud is another form of small business fraud you may come across as an owner. Worker’s compensation is the business’s defense if a worker gets injured on the job by compensating the worker for their injury. There are a variety of ways this type of fraud can be committed, so remaining vigilant and aware is key. Employees may get injured outside of work and claim this happened on the job, or they could feign an injury. Maintain up-to-date, accurate records, thorough documentation of on-the-job incidents, and watch out for signs of fake injuries.

Limit the amount of access you give to employees regarding banking information by granting a select few with access to those accounts. It’s important to trust your employees, but it’s not necessary to give every employee access to banking information.

 

Implement Surprise Audits

Surprise audits provide another shield against fraud by ensuring that all expenses are legitimate.

The Association of Certified Fraud Examiners offers an anti-fraud protection check-up, which is an easy and effective way to test your company’s fraud health. If you’re unsure of where to start for an audit, this a great tool to see which areas need to be improved upon and corrected.

Ensure you know your monthly numbers regularly as well. Reviewing financial statements on a regular basis (on a monthly basis, if time permits) will send off alarm bells if the numbers go awry.

 

Invest in High-Quality Anti-Virus Protection

It may cost more, but it’s worth it. Invest in a high-quality anti-virus and firewall for your computational system, as well as spyware and malware protection. You should also make sure these are updated on a regular basis.

 

Don’t Overshare on Social Media

Social media can be a great tool for keeping in contact with old friends and acquaintances but be careful what you share on there. Sharing too much information, such as compromising company or client information (sometimes without even realizing it) could have negative ramifications.

 

Data Destruction

Shredding your documents on a regular basis is crucial. Shredding confidential documents that have account numbers, credit card information, addresses or any other sensitive data will help protect your business from fraud or identity theft.

If you’re worried that it may be easy to forget to bring your documents in, on-site shredding services saves you from transporting all your documents. It’s ideal if you’re looking for quick, convenient service.

 

At SafeShred, we offer paper shredding services to hundreds of businesses throughout the greater Los Angeles area. From small, local businesses to industry giants, we are fully trained and NAID, FACTA and HIPAA compliant. Contact us today or give us a call at 1-800-987-4733. Our quotes are always free!

read more

cyber crime

October is known for pumpkins, scary movies and trick or treating, but it is also known for bringing awareness to cyber-crime. In fact, October is deemed as National Cyber Security Awareness Month. It was established as a way of encouraging awareness of cyber crimes and to strengthen our ability to protect ourselves. Protecting yourself online is so critical, as making one mistake gives hackers the opportunity to inflict significant damage.

Preventative measures are key. You may believe that it will never happen to you, but it is better to remain on the offensive and take the necessary steps. Check out some tips for protecting yourself online.

 

Tip 1: Switch Up Your Passwords

You may have already heard this before, but ensure you have different passwords for all your accounts. If a hacker can get into one of your accounts, at least they won’t access them all when different passwords are used. Also, don’t use common passwords like “1234” or “password” or something that may be easy to guess, such as your birthday. Don’t share your password with others and don’t write it down. Use more than eight characters when you set up a password, with a mix of characters.

Additionally, it’s effective to have separate emails attached to different accounts. If you conduct banking online, as most of us do, have an email account set up solely for banking purposes. If you use one email account and a hacker retrieves it, all they must do is enter a simple “password reset” to your email account and then they have access to all your information, including your hard-earned money.

 

Tip 2: Lock Those Devices

It may seem like a bother to enter a password every time you login to your computer or you want to send a quick text. These days, a lot of us have everything on our phones, including our banking information. Protect yourself by locking your devices and never leave your devices unattended—even for a minute.

 

Tip 3: Be Aware of Your Online Activity

Always be wary of attachments you receive over email, especially if the source is unfamiliar. Before clicking any links in articles, inspect the link. Often links with poor spelling direct you to harmful sites.

Also, if you must use a public computer or a friend’s phone, don’t conduct any online shopping or enter any banking information.

 

Tip 4: Be Careful What You Share

Be mindful of what you’re sharing on social media and your privacy settings. Posting information such as where you work, where you live or when you’re going on vacation leaves you vulnerable to hackers dying to take advantage. Make sure you check your privacy settings on your accounts too, because that leaves you more exposed.

If you receive any random phone calls from people asking for personal information, it’s okay to say no and call the organization directly. In these instances, it’s better to be safe than to be sorry.

 

Tip 5: Dispose of Media and Hard Drives Properly

Throwing out any unused or broken electronics even when erasing your hard drive is still risky. The most effective way to destroy any chance of data retrieval is  through hard drive destruction. Erasing your hard drive does not ensure that the information has been deleted for good. Throwing your electronics in the trash is not only bad for the environment, but it’s bad for your security.

Also, always make sure you report any suspicious activity on your accounts. A vast number of data breaches start with physical documents, so a shredding company is your first means of protecting yourself.

For more information on our shredding services and hard drive destruction solutions, contact SAFESHRED today or call us at 1-800-987-4733.

read more

September 26th is National Situational Awareness Day, so we thought we’d take some time to talk about different ways you can be more aware of how you present your personal information online and during day-to-day activities.

Carelessness Can Be Costly

In 2016, 15.4 million people became victims of monetary fraud or identity theft. The average amount lost per person was around a thousand dollars. Sometimes, the true cost of the theft may not become evident until several years after the fact. Personal data, like email addresses and account numbers, can be hoarded and later sold online. When the theft or fraud is finally noticed, it can cost untold hours in frustration and worry to get everything sorted out – and even then, there’s no guarantee that the stolen money will be compensated or returned.

The online world is home to our shopping, work, and social lives. We receive credit statements, ID cards, and bank reports through the mail, after which we can examine them in the comfort of our own home. The price for such convenience, however, can easily be found in how often and how easily we put ourselves at risk. Adopting healthier data management habits can help reduce the risk of identity theft and can help grant better control over sensitive information.

Good Online Safety Habits

  • Keep passwords unique – and keep them safe. Surely no one would use 123456 as a password anymore, right? Think again. A study from the UK’s National Cyber Security Centre (NCSC) found that those numbers, in that order, appeared in over 23 million passwords. Create a unique and memorable password for every account, and don’t share them with friends.
  • Never use a debit card for online purchases. Debit cards draw directly from your private checking account, which means that if it’s compromised, it could be a lot harder to get the money back. Credit cards, conversely, tend to have better protections in place. Even then, you can also get a one-time virtual credit card number from your bank, limiting the use to a single vendor.
  • Keep your phone number private. It can be hard to imagine navigating everything from social scenes to online purchases without a phone number. However, handing out your number to someone you just met can be a big risk. Use an app to create a burner number and save your real one for people and sources you trust.
  • Don’t surf freely on public Wi-Fi. On an unprotected, unsecured network, it’s easy for someone to peek at what you’re doing, and that can include seeing account details or password information.
  • Think before you post. If you post a picture online, you might also be sharing your physical location. If you mention you shop somewhere often, or just can’t get enough of the lattes from this one coffee shop, that information stays available for anyone to find. Carefully consider what you’re posing before you hit the submit button.
  • Read the privacy policy (yes, really). Privacy policies explicitly state how the information you’re submitting will be used. Sometimes, companies will share their customer information with other businesses or automatically sign you up for mailers. Know what you’re getting into before you continue.

Safe Practices for Home

  • Destroy documents with private information on them. Yes, this means the birthday card envelope from your uncle with your home address on it. It also includes anything with your phone number, your social security number, any ID numbers, school records, and credit card details. Pieces from single-strand shredders are relatively easy to put back together, so you may want to invest in a one-time paper shredding service.
  • Keep your ID cards in one, secure place on your person when you go out. Driver’s licenses are one of the most desired targets for thieves and fraudsters, and the violation can be hard to recover from. Similarly, social security cards, credit cards, and other forms of ID should never be left unprotected. If you must carry them with you, keep them somewhere close and never leave them unattended.
  • Request a credit report at least once a year. If there’s odd activity or missing/incorrect information, you may need to take more proactive steps to investigate. It’s an easy, free way to keep an eye on your accounts.
  • Don’t give out any private details over the phone. Phone scams are one of the most common. Your phone will ring, and on the other end, an urgent-sounding individual demanding money or information in order to pay a bill or restore service to a utility. Hang up and call the institution or business back at a verified number.

Be Proactive Through Mobile Document Shredding

Many of the above tips are behavioral in nature, requiring either a change in habit or an action. One, however, requires both the decision to act and the mechanical equipment to follow through.

Residents and home businesses often find they benefit immensely from the peace of mind that follows a one-time paper shredding appointment. They can observe the destruction of their documents in real time and can relax in the knowledge that the particles will be safely transported to a recycling facility for processing. The only preparation required is the gathering of all documents to be destroyed.

For more information on mobile document shredding and how it could benefit your business, call 1-800-987-4733 or send us a message online!

read more

Data security has become a prime concern for many Americans and businesses alike. With California filing the third highest number of identity theft complaints of any US state per capita, it’s clear that data security is a real issue which has held fairly steadily over the past few years; despite new advancements in data security technology and practices.

Thankfully, governments at both the state and federal level have worked to act and try to reduce the risks for consumers and organizations across the country. With many different pieces of legislation being crafted for various industries with different information needs, one piece of legislation stands out as impacting nearly all US businesses and consumers.

 

A Brief Look at the History of FACTA

Signed into law in late 2003, The Fair and Accurate Transactions Act (FACTA) was put together by federal lawmakers as an amendment to the Fair Credit Reporting Act. It was crafted with the goal of helping consumers to protect their personal information, and to hold organizations and users of consumer data who fail to protect it, accountable. The act applies to nearly all consumers and organizations in and across the US.

 

What do Businesses and Consumers Need to do?

FACTA requires organizations that maintain and use consumer information to take reasonable measures to protect the data of both consumers and employees. This includes making sure that sensitive data is properly disposed of through the right channels, and with methods that ensure that information can’t make it into the wrong hands. Consumer information can refer to things like:

  • Drivers licenses
  • Phone number
  • Email address
  • Physical address
  • Social security numbers

 

Professional Shredding Services Offer a Solution

Document shredding has come to be a proven method for the secure disposal of physical and electronic information. When done professionally and with the right equipment, shredding services ensure that information stored on paper documents and hard drives is virtually non-recoverable, and permanently destroyed.

FACTA requires impacted organizations to take “reasonable measures” to ensure such information does not fall into the wrong hands. Reasonable measures have come to include burning, pulverizing or shredding of paper documents. Contracting a document destruction professional also qualifies and is highly encouraged.

 

Let Our Team Help Your Organization Comply with FACTA Rules and Regulations

SAFESHRED maintains the team, equipment and experience needed to ensure that the job is done to the highest quality. No matter whether you prefer on-site or drop-off services, regular or one-off, paper or hard drive; we can do it all.

No matter the job size, our team can take care of it! Talk to us today to find out more about our shredding services and service region.

read more

No matter whether you use a computer for personal or business purposes, you’ve likely become at least somewhat familiar with computer viruses and the damage they can cause. The reality is that cyber security is a truly critical piece that should be considered any time you use a device connected to the internet. The risks and potential damages that can arise from a lack of cyber security management can be irritating in mild circumstances, and completely devastating in the worst cases.

Cyber security refers to the protection of devices that maintain a connection to the internet. It can be applied to devices such as computers, mobile phones, tablets, smart watches and much more. Cyber security includes the protection of both hardware and software.

 

No Single Solution for Truly Effective Cyber Security

Cyber-security relies on many different things in order to be truly impacting and effective. Generally speaking; this means that simply updating software and installing anti-malware software isn’t enough to have a truly robust cyber security solution. The human element is vital to successful cyber security measures; picking strong passwords, staying away from questionable websites, and being mindful of what you type into a website are all important things to consider maintaining a truly effective protocol.

Email is an area of concern and vulnerability. For many email users, phony emails can often be found by simply browsing your junk email folder (just don’t open any of these emails!). Many senders will use email to lure in users to click a malicious link or website. Knowing how to spot a phony email is key. Take a look at Cisco’s phishing quiz to see how well you can spot fake emails and websites.

 

Multiple Approaches of Attack

Cyber attackers have many ways of going after internet users. Here are some of the most common forms of cyber-attacks:

 

  • Phishing– Phishing is when cyber attackers use websites or emails that appear to be legitimate to draw (or “fish”) victims in. Such websites and emails often imitate other websites, organizations or individuals in order to lure users in.

 

  • Malware – Broadly defined, malware is any software that is designed with malicious intent. Malware can include things such as computer viruses and worms. Malware can also often be found to imitate the appearance of other safe programs or applications.

 

  • Ransomware – This is likely the most frightening of the three listed to experience. Ransomware is when a computer or device is targeted by a hacker and is taken over in its entirety; often through encryption. The user is usually presented with a full screen that reads a message demanding a form of compensation to return access to the computer and its files.

 

With more and more organizations turning to computers to create, manage and store information, cyber security has never been a more vital piece to be mindful of. Proper cyber security can protect not just your employees and devices, but also your entire business.

 

Physical Data Destruction You Can Count on

Cyber security is vital, but it is only a part of total data security. Protect your physical data with SAFESHRED secure document shredding services. Our team of shredding technicians provide secure document and hard drive shredding services right on site when you need them.

If you’re looking for secure shredding services that you can count on, talk to our team today to get started on putting together a solution that works for you!

 

read more

It can seem like a great idea to save you time and money. Picking up and using your typical office shredder in your home or workplace. Why bother paying to do this when you’re handling it all fine by yourself? The right papers are being shredded on time, shredded material is being recycled properly, and secure retention is being executed. You’re as safe as you can be, aren’t you?

If this is your approach to shredding, then you’re going to be in for a shock, as you’re far more vulnerable than you think. There are unforeseen expenses that will rack up over time, the actual shredding isn’t secure, and you’ll have a hard time proving proper compliance with privacy regulations. A professional shredder will take care of this for you, ensuring your peace of mind. Let’s have a look at each point first.

Unforeseen Expenses

While an office shredder may initially seem like the cheaper option, you are in fact getting exactly what you pay for. The motors in these machines are not up to the job of long-term shredding, and will often burn out, leaving you with a pricey paper weight. Should you choose to spend a little more the first time for a higher quality shredder, you may get more time out of it, but in the end, it’ll suffer the same fate.

That’s all just the shredder itself. This doesn’t take into effect the additional costs of making sure you have proper retention methods for storing papers. All costs ad up over time, and in the end you’ll be out more by going it alone.

Unsecured Shredding

So what exactly do we mean by “unsecured shredding”? What we are referring to here is the actual shred pattern itself. Most office shredders tend to shred papers into long, thin strips, which are easily reconstructed. Anybody with too much time on their hands and a degree of dedication could sift through the remains and rebuild each page, and then they have all the information you tried to destroy. The more expensive units can shred more securely but see back to our points on unforeseen expenses. Professional shredding reduces papers to fine confetti, making reconstruction completely impossible.

Privacy Compliance

Keeping up with all the privacy regulations you are under can be difficult, especially if you have an operation across multiple states. While you need to know this, a professional shredder can help you prove that you are staying in compliance. When you have shredded records with a professional, you will receive a certificate of destruction, an official document that proves you have completed your shredding.

When you don’t meet compliance, or can not prove it, you will be in some trouble. A lose of trust with your client base is only the start if you have clients. Fines may be leveled against you for violating your compliance requirements. Should a data breech occur, and you have been found out, or be unable to prove, your shredding efforts, you’ll be facing massive damage that may takes years to recover from. Assuming you can recover from the damage to begin with.

We’re Here To Help

If we’ve managed to convince you, or if you have some questions, get in touch with us. We’ll help you out with your needs and close as many vulnerabilities as possible.

read more

Using our shredding services comes with several advantages, not the least of which is how we’ve designed them to maximize security and convenience. Nothing says these have to be mutually exclusive, and we work hard to make sure you get to benefit from both.

Our Shredding Trucks

The advantage of shredding trucks is their ability to come to any location at any time. We’re able to reach all of our clients no matter where they are located in our service area. It also allows us to service any job no matter the size. Doing all shredding right on-site before your eyes allows you to view the whole process and provides you with great peace of mind that the job has been completed successfully and to your satisfaction. Certificates of Destruction are provided to you on the spot for your records, letting you verify you have met your shred needs.

The flexibility these offer also lets us provide you with the options to receive shredding once or on a schedule. This ensures that everyone can stay on top of their shredding needs no matter what they are. By doing so you won’t fall victim to any compliance fines for falling behind.

Shred Bins

When files are being retained, or you find yourself in between visits from the shred truck, you’ll have to keep your records secure. One solution is to keep them locked in a file cabinet or a safe, but this isn’t a great plan for files with a high turn-over rate. What is needed is something that is secure while being quick and easy. The solution to this is the afore mentioned shred bins.

These bins and desk consoles are simply containers with a lock and letter slot on them. This lets you dispose of them easily, reducing any loss in productivity, while keeping papers safe. The bins are placed in strategic locations around your business and office to make them easy to access. When the time for shredding has come, one of our uniformed staff members will come in, wheel the bins out to the waiting truck and commence with the shred action.

Ready to Shred

When it’s time for you to consider shred services, make sure you look for the mobile shredding option with shred bins. By maximizing security and convenience you can make sure your document disposal process is as secure and easy as it can be made. Getting service is as simple as reaching out to us and telling us your needs. We’ll help to determine what is best for your needs.

 

read more

Spring Cleaning Your Desk

On April 30th, 2019, posted in: SAFESHRED News by

We’ve come to that time once again, a time where we look to any messes that have accumulated over winter seasons and declare that they must go. Spring cleaning can be a hassle, but it’s also a relief once its been cleared away. While you’re in cleaning mode, it’s a good time to take a hard look at the growing clutter happening at your desk, be it at home or work.

So why might you want to do this anyways? Well it all comes down to staying on top of any secure information that may have ended up lost in the mess. It happens to all of us. Papers come in and get put to the side on top of one another, and then more come in and it happens again. Sometimes this happens right on the desk’s surface, other times it happens in a drawer as papers get pushed back into their depths.

If you’re vigilant about what is being kept then this probably isn’t a problem for you. However, for the rest of us who aren’t necessarily on top of it all the time, this is a chance to get caught up. Speaking of getting caught up, where do we even start this process?

Getting Caught Up

So depending on how bad the build up is will depend on how long it will take to get it all done. The only way to get caught up is just to dive in and do it. Doing it properly is just as important as doing it to begin with.

By this point you should probably know the types of things you need to be on the look out for in that mass of papers. If not, here’s a quick reminder of some of the items to be on the lookout for:

  • Financial information
  • Medical records
  • Bank & Credit card statements
  • Pages with names and address on them

In addition to cleaning up your desk, there are other areas where you may need to have a look at this spring. We won’t go over it all here as you can see our recent article on the subject, but some times we do not realize that an area could be a problem for this sort of thing.

If you need assistance with this sort of clean up, then our experts at SAFESHRED can assist you. Simply contact us and provide the details, and we’re more than happy to lend a hand.

read more
Live chat by BoldChat