Augusta Data Storage Offers New Secure Collection Containers for Electronic Devices

At Augusta Data Storage, we are always looking for ways to meet the growing needs of our customer base in the CSRA. We pride ourselves on being a solutions-driven service provider, and we recently got to put our problem-solving skills to the task! For many of our customers, the convenience and security of our collection. . . [Full Article]

Protecting Your Information and the Environment Part 2: E-waste Destrcution

In 2016 Augusta Data Storage was proud to add secure e-waste destruction to our list of NAID-AAA Certified destruction processes. As a part of these services we process a variety of “end-of-life” electronic devices that might otherwise end up in landfills, including hard drives, server drives memory boards, back-up tapes, mobile devices, computers and more.. . . [Full Article]

The Importance of Managing Your Business E-Waste

In today’s high-tech business environment it is not uncommon for employers to provide their employees smart phones, tablets, laptops and other devices to help them stay connected in and out of the office.   Many companies have processes and requirements in place to ensure these devices are secure as employees are using them to send,. . . [Full Article]

Augusta Data Storage Releases 2018 Environmental Report

2018 marked another year of exciting changes and growth for our organization! At the end of last year the ETG umbrella got a little larger as we welcomed our new sister company, A1 Bestway, an agent for Mayflower Transit! In our Data Storage operation, we saw increases in our shredding and recycling segments and capped. . . [Full Article]

Information Security Threats Likely Happening in Your Office

Managing information security is an on-going process that requires education and understanding from each member of your organization, from upper management all the way down to your part-time employees, and even interns.   From managing personal records via the computer to maintaining paper files, understanding the risks and working every day to prevent accidental breaches. . . [Full Article]