COVID-19 has changed how we work, and where we work. Many people now working from home use personal devices, with great risk to cybersecurity threats. Professional business environments are often equipped with IT responsible for managing data security, but personal home networks are much more vulnerable to attacks. With a lack of hardware and enforced…

Read More

For anyone managing personal data or records, compliance is a key component in the success of your information management systems. But, while there are some widely accepted rules, compliance looks different in every industry and at every phase of the information management process, from intake to final destruction. As we move further into the  “information…

Read More

With Microsoft’s Windows 7 reaching its End-of-Life on January 14th this year, devices running  this operating system will no longer be receiving security updates. This puts many Windows 7 users at risk, especially businesses responsible for keeping their customer’s information safe. But before you go upgrading to new equipment and tossing hard drives into storage,…

Read More

In the age we live in, technology has become significantly more ingrained in our everyday lives and, consequently, our information is stored in all kinds of places. With corporate and personal information being so omnipresent and accessible, it’s become much more susceptible to hackers. Data breaches reached an all-time high in 2017 in the form…

Read More

When many businesses talk about backups and steps they are taking to protect their data and information they mention servers and cloud-based systems that automatically record information, backup data regularly and are accessible from anywhere. In the age of instant access, these are great (and valuable!) solutions, one backup is better than none, but if…

Read More

We live in an information-rich world. Statistics say humans create over 2.5 quintillion bytes of data every single day. That’s a lot of data. While that number represents a variety of information, from various platforms, you can bet that a sizeable chunk includes critical business data. As our world continues to shift to digital records…

Read More

From professional services firms to doctor’s offices, hospitals, and even private companies, the role that information plays in day-to-day operations is undeniable. For many businesses and organizations managing and maintain proprietary and personally identifiable information are regular practice, but practice doesn’t always make perfect. For many managers, finding the time to devote to building comprehensive…

Read More

We talk a lot about the “end of life” protection of information and data, from our NAID AAA Certified document destruction process, to our secure e-solutions, you know that Augusta Data Storage is a partner you can trust when it comes to protecting your information during destruction. What about the data you access every day? When your information and data is…

Read More

In today’s high-tech business environment it is not uncommon for employers to provide their employees smart phones, tablets, laptops and other devices to help them stay connected in and out of the office.   Many companies have processes and requirements in place to ensure these devices are secure as employees are using them to send,…

Read More

As a business manager or owner, it is your responsibility to properly store and safely dispose of any records containing personally identifiable information. Personally identifiable information is a specific category of information that is associated with an individual person (employee, donor, patient, customer, student, etc) and can include items like:   Social Security Number Passport…

Read More