In Response COVID-19 (Coronavirus) -- Read More
Get A Quote Now!

IntelliShred QuickQuote

Be sure to ask for your "early spring discount"

Do You Need To Shred Junk Mail?

Identity theft is big business. We’re not joking. In 2019, $16.9 million was lost in the US as a result of fraud. That was despite a 0.6% drop in the number of customers affected. More thieves are now attacking the same group of people again and again.

Why is this important for you? Because if you choose not to shred junk mail, you could be next. You might be waving goodbye to your savings, assets, and insurance if you don’t protect yourself. These people will target you, your business, and even your children if you let them. But fear not, because we are not going to let them.

In this article, you will find out why you must shred your junk mail and which items you should destroy. You will also discover the additional benefits of shredding junk mail and if there are any safe documents you can dispose of without shredding.

What Should I Shred in Particular?

You should shred a lot more junk than you think. One example is used boarding passes from your business trips.

Thieves can use the QR code on your boarding pass to find out your travel plans, making you a possible target for pickpocketing or worse crimes when out-of-town. Criminals can also use the QR code to hack into your online account for a particular airline, change your details and steal any loyalty points and stored credit cards.

The personal privacy risks related to not shredding your boarding pass are also why you should never post pictures of these on social media.  You should also shred old utility and tax bills. Even if you think they’re useless to anyone once you’ve paid them, criminals can use your personal information on them to access places where you keep your money.

The same goes for receipts, which still include parts of your credit card details. This is especially important if you’ve bought something with a business account, since a hack could affect your ability to pay your employees and partners.

Are There Any Documents I Can Get Away With Not Shredding?

Takeout menus can be safe not to shred, as long as they do not include your name and address. Newspapers you’ve bought from the store are also okay to throw away without shredding, as are old magazines.  All other leaflets and neighborhood coupons without your name on can also be thrown away without shredding.

However, the problem with all of the above is that most of them are heavier items that take up a lot of space in landfill sites. And let’s be honest, taking them out is a chore.

You can save yourself time and energy by opting out of certain kinds of junk mail. The Federal Trade Commission has a page on its site with more details. You can choose to stop receiving these types of post either for five years or forever.

How Should I Store Documents That Might Be Important Later?

Some mail we consider to be junk will be useful to us later. Tax returns are an example of this, as are some transaction receipts. But you shouldn’t leave them lying around your home or office.

Documents that you might need later should be stored in a lockable location. One example is a safe, while you might also want to invest in a filing cabinet if you have a lot of paper to deal with.  If you later no longer need these papers – for example, the necessary time has passed to keep hold of tax records – you should still shred them like you otherwise would. Even after decades, thieves can still use your name for identity theft.

You can alternatively choose to scan documents onto your computer and keep them stored in a secure cloud. In such instances, however, you need to think about the risks of a possible cyber attack.

What Are the Other Benefits of Shredding Junk Mail?

Shredding junk mail guarantees that even harmless-looking coupons won’t pose a data theft risk. Having a decluttered office will also lower your stress levels.

Since you will not be as tense each day, you’ll think more clearly and get extra work done. Which is great for your business, because that means more revenue.

Mail shredding is also good for the environment. 40% of timber chopped for commercial purposes globally is for paper, but you can use shredded paper as an ingredient in compost. And of course, it’s easier to carry to the recycling bin.

Is There a Difference in Mail Shredding Services?

NAID Certified shredding services offer an extra layer of protection when you choose to shred junk mail. All companies of this kind check to make sure their employees haven’t been involved in criminal activity while also making them sign non-disclosure agreements (NDAs).

You should also shred your papers with a NAID Certified business because they have officially met national standards for destroying data safely.

Verified companies also keep up with the requirements they first met since they are liable to random audit checks without prior warning.

As well as taking care when handling confidential data and stopping the wrong individuals from getting hold of them, NAID Certified shredders also make sure that electronic data is wiped after disposal.

Shred Unwanted Documents and Enjoy Peace of Mind 

While throwing out a lot of junk mail may seem harmless, the reality can be the opposite if you aren’t careful. Thieves can use unshredded documents and receipts to access your personal information and steal your identity for their own interests. Shredding your junk mail also allows you to think clearer in a decluttered workspace and also do your bit to save the planet.

Fraud costs businesses, families, and hardworking individuals millions of dollars each year. Unshredded junk mail contributes to this. You can help beat this problem by thinking twice before you dump your paper without shredding it.

IntelliShred offers comprehensive shredding solutions throughout the tri-state area. To find out how we can help you safely destroy sensitive information, contact us.

Do You Have Corporate Identity Theft Protection?

There are many types of corporate identity theft, but the most common is a cyberattack. This type of attack involves a hacker that is able to steal company information by hacking into a server or individual computer. Of course, this is done without the organization’s knowledge, in the same way data breaches affect consumers. Other types of theft include when physical company documents or records are stolen. It can happen either from within the business at the hands of an employee or even if paperwork is mishandled or improperly discarded.

Computers have provided businesses with numerous benefits. However, they have also made it easier for outsiders  act against them than ever before. For proof, consider the fact that 66 percent of small and medium-sized businesses in the entire world experienced some kind of cyberattack in 2018,

As a result, companies need to put serious effort into protecting sensitive information because a cybersecurity breach can have such catastrophic consequences. One excellent example would be a disruption of the computer systems that make it possible for them to run their revenue-earning operations, which can be particularly painful if they don’t have either up-to-date back-ups or a well-practiced way to use those up-to-date back-ups. Another excellent example would be the theft of sensitive information that can be used to steal identities. Something that can cause outraged customers suing the corporation for compensation, thus resulting in legal fees and other losses. On top of that, consumers can be very sensitive to identify theft, meaning that such incidents will have a lasting effect on the corporation’s brand and thus the corporation’s marketing. Combined, it is no wonder that 60 percent of smaller companies go under within 6 months of them being hacked because they just don’t have the foundations needed to soak up such a hit.

How Can a Professional Destruction Service Prevent Corporate Identity Theft?

If confidential information falls into the wrong hands, your business could suffer immensely. The thief can impersonate you and others within your business to steal from the company. Whether it’s running up credit card bills, purchasing equipment, applying for business loans, or using information for their personal gain, corporate identity thieves show no mercy.

There are various measures that companies should implement to prevent identity theft as well as other cybersecurity issues. One would be the use of a professional destruction service to prevent potential leakage, which is much more important than what interested parties might imagine. After all, most cybersecurity breaches don’t happen because of some kind of super-criminal with incredible hacking skills. Instead, most cybersecurity breaches happen because human beings are prone to making mistakes from time to time, thus enabling opportunistic individuals to break into even the most secured systems. Thanks to this, it is very important for companies to make sure that the sensitive information on storage mediums that are no longer in use be destroyed by a secure destruction service.

As for what will happen in said process, the answer is very simple and straightforward. Document shredding will ensure that paper documents are destroyed beyond recovery by reducing them into such small pieces that they can’t be put back together. Meanwhile, hard drives are more resilient, which is why hard drive destruction is much more intensive in nature. Some companies might be tempted to just format a hard drive before overwriting it a few times. However, there are people out there who have claimed that this isn’t enough, which is why they should consider eliminating all doubts by having the hard drive physically destroyed by a secure destruction service with the tools needed to do so.

Regularly changing logins, passwords and other methods for accessing corporate bank accounts, credit cards and other important files can help prevent corporate identity theft. Company employees can sometimes be duped into logging into a fake website which matches the one they normally log into. After they log in, the hacker can easily steal information to get account numbers, trade secrets, proprietary formulas and more.

Phishing is another way that identity thieves will try. An employee may receive company emails that appear to be from a trusted source but contain fake links. Once these links are clicked upon, hackers can access to the company’s network. Phishing emails can also dupe employees into providing logins and other sensitive information.

Further Considerations

Any size company can be vulnerable to corporate identity theft, so it’s absolutely crucial to put safeguards in place that will protect your business. To ensure that your company does not fall prey to criminals, be sure to update safety procedures, train your team on how to spot phishing attempts and definitely implement a shredding policy and schedule.

You should be thorough in the protection of sensitive information by making sure that the storage mediums have been handled by a professional destruction service. In this manner, interested parties can ensure complete peace of mind for themselves.

IntelliShred has been awarded the highest security rating, “AAA Certified” by the National Association for Information Destruction (NAID). Contact us today on how we can help save your business from corporate identity theft.

Confidential Document Destruction

As a business owner, when it comes to your New Jersey company, regardless if it’s a mega corporation or a small startup, protecting yours and your staff members’ confidential information is critical. Over the past few years, identity theft is being a growing issue in New Jersey and across the United States, and confidential document destruction is a sure way to prevent this.

In 2014, 17.6 million American residents fall victim to identity theft crimes and when government and corporate databases are lost or stolen, nearly 100 million more residents have their private, personal information put at risk of identity theft. In addition, 64.1% of reported identity theft is from the misuse of a credit card, 35% of an existing bank account and 14.2% of others personal, private information.

According to Statista, there were 1,473 data breaches in the United States in 2019 alone. As the national press focuses on hackers and digital crime, it’s easy to forget that small-scale theft can use more old-fashioned techniques.

Here are a few ways your New Jersey business can lower the risk of identity theft from happening.

Are You Protecting Your Staff and Customers?

Take a moment to think about how often you print out information during your typical workday. Perhaps you’ll print off a timesheet or contract, notice a typo, then print it again. Or, you’ll create a quote for a customer who then changes their mind about some details on the order, so you print off a fresh copy with the correct details. What do you do with the outdated documents?

If you throw them in the trash, you could be unwittingly putting people at risk of identity theft. You might think that there’s not much a person can do with that information, but names, addresses, email addresses and telephone numbers are all useful pieces of information. If the documents getting thrown away have other identifiers or financial information on them then they are an even more powerful tool for would-be scammers to build a profile of a person.

Ripping Up Documents is Not Enough

Some well-meaning managers encourage people to rip up documents before discarding them. While it’s true that a scammer would rather get their hands on an intact copy of a payslip or utility bill, the documents still have a use when ripped up by hand. If parts of the document are legible, then that’s enough for the scammer to forge a copy or just extract the information they need. The practice of rifling through bins is known as ‘dumpster diving’, and it’s lucrative enough to have persisted to this day.

Confidential Document Destruction Services

To combat dumpster diving, ensure that you have your documents and records properly shredded by hiring a professional shredding service in NJ. We recommend using a professional shredding company with shredders that “cross-shred” documents so that they cannot be pieced back together. Our confidential document destruction team will ensure that all of your documents and records completely destroyed using our state-of-the-art equipment. Make sure that you know where your documents are going and who will be handling them. We allow clients to watch their documents being shredded on-premises via a TV screen and recycle the shredded paper, giving you peace of mind that everything is disposed of in an ethical and environmentally-friendly way.

Strong Computer Passwords

Breaches into online accounts and computer systems are spreading fast. A key to small business fraud prevention is to ensure that your online accounts are hard to crack, make sure your passwords are complex. Use a combination of uppercase and lower case letters, numbers and computer symbols, such as $ # & *, and in addition, make sure your passwords are 8 characters long, at minimum.

Install Anti-Spyware Software

While using strong passwords is important, data hackers are still finding ways of breaking into your computer systems to take your information. Many hackers use spyware software to access your information on your computer. Use strong antivirus and antispyware software programs that will help protect your private data.

Regularly Review Your Bank Account and Credit Card Reports

For every statement with updates to your personal and business bank accounts and credit cards, take extra time to read over them over. Regardless how small the dollar amount could be on paper, if money was taken out of your account or charges or purchases on your credit card, contact your banking representatives right away. Review all information and reports on your statements each month and once you no longer need your reports, make sure you have them correctly destroyed, via professionally shredded.

Before you book a confidential document destruction service, we recommend that you sort through your documents and decide what you need to keep and what can safely be destroyed. Keep important documents in a secure part of the premises, and periodically destroy older, unnecessary documents. Once you build the habit it will give you peace of mind that your customer and employee data is secure.For more information on our confidential document destruction services, contact us at 1 (866) 747-3360.

Protect Proprietary Information

All companies collect personal, confidential or proprietary information at one time or another. Because of the ever-present risk of identity theft, these companies have a responsibility to protect proprietary information. Failing to comply with data protection regulations can affect your company’s reputation and even bring on serious fines and penalties.

All organizations must protect proprietary information in accordance with two privacy laws called HIPAA and FACTA. Any documents containing personal information must be shredded when they are no longer of use. Using trash or recycling bins to dispose of these items incorrectly can cause your company to incur fines.

Most companies assume that shredding is something they can handle, but using a small office shredder does not guarantee the same level of security as the high-tech equipment of a professional shredding company. Identity theft and fraud can occur when documents are shredded by a regular office shredder because the waste can be reconstructed by thieves.

The best way companies can block their risk of theft is to hire a third-party shredding and destruction company to destroy their proprietary information. If it falls into the wrong hands, the theft of that information could negatively impact your company. A shredding and destruction company will not only safeguard access to protect proprietary information, it will also help reduce your company’s impact on the environment.

Bulk paper shredding service companies are held to the strict standards and regulations which specifically govern their shredding process. They must collect the proprietary information, shred it according to regulatory procedures, and transport the waste to a recycling or destruction facility. At the end of the process, they should provide a special certificate which proves your information was safely and securely destroyed.

It’s more convenient and cost-efficient to use professional shredding services. Most of them offer on-site or mobile shredding – meaning that transporting tons of paper to a facility is not necessary. Outsourcing document shredding will help give employees back valuable productivity. In-house paper shredding takes time and often takes away from an employee’s regular job duties.

At IntelliShred, we hire the most qualified technicians who have years of experience with protecting proprietary information for security, legal, and regulatory industries. They will learn all they can about your business and its data management process so they can create a turn-key shredding and destruction solution that fits.

We are proud to offer our customers access to our highly-qualified, efficient team of technicians, our fleet of mobile shredding trucks, our high-tech software for tracking confidential waste and secure bins for storing paper.

We’re proud to be a fully-compliant, award-winning service provider. We manage our business according to the guidelines of the United States Privacy Act, the Safe Harbor Act and the Health Insurance Portability and Accountability Act (HIPAA). We offer our customers the most reliable, comprehensive services with along with the best technological tracking software.

We not only handle destruction of paper, digital storage devices, but we also destroy x-rays for our medical industry customers. For more information on our services, please contact us – we are happy to answer any questions you may have and can easily provide you with a list of references.

Disposing Of Confidential Information

At one time or another, every business could end up dealing with theft of their confidential or sensitive information. Whatever information your company stores should be secured or properly destroyed if it’s no longer needed. To help avoid the theft of confidential information, every company should implement a document disposal process.

When faced with the challenge of safeguarding information, it’s best to follow the following disposing of confidential information guidelines:

Develop a confidential information management policy
In order to lower your company’s chances of experiencing a data breach, it’s best to establish a specific business records retention schedule. This type of policy will help determine how long your business should store confidential documents or records. Your policy should specifically state how confidential files are dealt with and who should have access to them. Every employee in the company should be trained and face consequences if they don’t adhere to the company’s confidential information policy.

Change your company’s environmental impact
It’s not just illegal to throw away documents with sensitive information, there is also a significant environmental impact. Recycling is effective, but for confidential documents it may not be secure enough – shredding is a better way to ensure that sensitive information does not get into the wrong hands. It’s not efficient or effective to rely on store-bought shredding machines – they cannot handle the disposal of confidential information in high volumes, or destroy a digital media storage device.

Most experts suggest that paper should always be shredded using a cross-cut method in order to destroyed beyond recognition and most store-bought shredders don’t feature that ability. To save the environment, it’s best to cut paper down to a size which can be recycled more easily – only professional shredding equipment can shred down to the smallest size.

Make sure you find the right shredding company
Proper disposing of confidential information is always worth the extra investment. Don’t put your confidential information at risk by choosing just any shredding and destruction service. A professional shredding company can help you stay in compliance. Avoid legal trouble, help save the environment and obtain peace of mind that you’ve done everything you can to protect the valuable information you store.

It’s best to find an experienced shredding company with a strong reputation and good references. Look for a provider that is certified by the National Association of Information Destruction (NAID). If they are AAA certified, then you know they are working with the highest ethical and professional standards.

There are many reasons why a professional shredding company will help. They typically provide a certificate of destruction which will prove that your company is in compliance with shredding and destruction regulations. A professional and accredited service is ideal, because if an identity theft case ever surfaces, your business could be held liable.

Most of these companies will provide certificates of destruction which prove that the shredding and destruction process was properly executed. They can also help your company avoid legal trouble, help save the environment and provide the proper protection for the valuable information you store.

IntelliShred is a full-service document shredding and destruction company which offers daily, weekly, and monthly service packages. We are NAID members and we have a fleet of mobile shredding and destruction trucks with state-of-the-art equipment. Learn more about how we can help you protect your business – contact us today for more information on our services.

Corporate Information Management

With the many recent reports of fraud and theft, companies both large and small are always a target. Today’s employers must work diligently to prevent the theft of confidential and proprietary information.

Regulations like the Gramm-Leach-Bliley Act and the Sarbanes-Oxley Act are in place to offer protection, but companies should also add on policies and procedures which help them safeguard against fraud.

It’s simple for organizations to establish and enforce corporate information management security policies – following these steps will help them combat against fraud.

First Step: Identify and prioritize confidential information within your organization

Most organizations need to begin by categorizing their confidential information by value and confidentiality. By doing this first step, companies can prioritize which data to secure first. Customer information systems or employee record systems are the easiest places to start. Social Security numbers, account numbers, personal identification numbers, credit card numbers and other types of structured information that will need to be protected. Contracts, financial releases and customer correspondence are also important to protect.

Second Step: Perform a risk assessment and study current corporate information management

It’s necessary to see exactly how confidential information flows around the organization. Identifying the processes that involve confidential information is a straightforward exercise, but determining the risk of leakage requires a more in-depth examination. The following questions are important to get answers to:

Who can access these confidential information assets?

How are these assets created, modified, processed or distributed?

What type of gap exists between stated procedures and the exact actions of employees/staff?

Keeping these questions in mind, companies will be able to identify vulnerabilities in their handling of corporate information management.

Third Step: Determine the appropriate levels of access to confidential information

A company can develop distribution policies for all types of corporate information management based on the risk assessment. These policies should govern exactly who can access, use or receive which type of content and when, as well as oversee enforcement actions for violations of those policies.

Distribution policies should be created for the following types of confidential information:

Customer information

Executive communications

Intellectual property

Employee records

When these distribution policies are better defined, companies can then also implement monitoring and enforcement points along the communication paths.

Fourth Step: Implement adequate monitoring and an enforcement system

It’s crucial for companies to monitor and enforce established policies. The system created should monitor information usage and traffic, verifying compliance with distribution policies. Software systems can accurately identify threats and prevent them from affecting the company. The monitoring system should have the ability to avoid false alarms as well.

Fifth Step: Review monitoring progress and level of fraud risk

The most effective way organizations can protect against fraud is to regularly review their systems, policies and training. Through monitoring systems, organizations can improve employee training, expand deployment and systematically eliminate vulnerabilities. Systems should be reviewed regularly Both internal and external audits are useful for eliminating vulnerabilities and threats.

Today’s companies need to identify sensitive data; understand current business processes; craft appropriate access, establish distribution policies and monitor all communications. One of the easiest ways to safeguard your confidential information is to shred and destroy documents and information storage devices.

The benefits of hiring a professional shredding and electronic destruction service are clear – it’s the most effective way to avoid facing information security risks. It’s absolutely crucial to put safeguards in place that will protect your business. IntelliShred has been awarded the highest security rating, “AAA Certified” by the National Association for Information Destruction (NAID). Contact us today on how we can assist you.

Handling Confidential Information

In today’s information age, every business should be knowledgeable about handling confidential information. No matter the industry, size or scope that the company works within, there should be comprehensive information disposal process put in place.

These are the top five mistakes companies make with handling confidential information:

MISTAKE #1 Not controlling employee access to confidential records
Whether it’s paper documents or information that is stored digitally, it’s crucial to control access to it by using passwords, firewalls and encryption. When passwords are used to control access, they should be changed on a regular basis. Although we live in a mostly digital world, some businesses still deal with a lot of hard copies. In order to safely and securely store confidential paper documents, you should have lockable storage cabinets available that are only accessed by certain employees.

MISTAKE #2: No policy in place to protect confidential records
There’s an easy way to diminish the risk of experiencing a data breach. Simply establish a policy that dictates exactly how long your business should store confidential documents or records. It’s not recommended that confidential files are kept for longer than they are needed because that could increase your company’s risk of a data breach or identity theft.

MISTAKE #3 Not properly training employees on how to handle confidential records
It’s simple – make sure your employees know what risk they could face if they don’t learn how to handle the confidential information that your company stores. It’s essential to explain why data confidentiality is so important and offer them the many ways they can protect it. Teach them how to use secure passwords, make them follow a process for secure hard drive destruction, shredding and destroying documents or information storage devices and most importantly, explain the consequences of not doing these things. It’s very practical to train your employees in-house, but you can hire professionals to help you as well.

MISTAKE #4: Using store-bought shredding machines to shred paper documents
There’s nothing that compares to the efficiency and accuracy of a professional shredding service. Store-bought shredding machines are not equipped to handle large volumes of paper at one time and before you shred, you must remove staples and paper clips. These machines also require constant maintenance because they frequently jam and break down.

MISTAKE #5: Not hiring a professional shredding company
Hiring a professional shredding company for the disposal of confidential information is the best solution. It’s important to choose a vendor with a strong reputation and good references that is certified by the National Association of Information Destruction (NAID). They should have received proper AAA certification, which proves they are working within the highest ethical and professional standards.

Hiring a professional shredding company will give you the peace of mind that you’ve properly protected the confidential information you store. IntelliShred provides full-service document shredding and destruction on site, and offers daily, weekly, monthly, service packages. We can help you protect your business – contact us today to learn more about our services.

Theft Of Confidential Information

Today there are many different threats a business could face – but the costliest threat is theft of confidential information. Here are four steps you can take to protect your company and its sensitive data:

Step #1: Monitor how confidential information is handled and stored
It’s most ideal when companies categorize types of confidential information. By doing this, it’s helpful to prioritize what data to secure first. Customer information systems or employee record systems can safely contain Social Security numbers, account numbers, identification numbers, and other types of sensitive information need to be protected. Securing unstructured information such as contracts, financial releases and customer correspondence is an important next step that should be rolled out on a departmental basis.

Step #2: Perform regular risk assessments
It’s wise for companies to put procedures in place that will help them assess risk and prevent employee theft. Monitoring confidential information across all the major company departments must be a regular occurrence. However, finding the source of a breach may require more in-depth investigation.

Ask the following questions during the risk assessment process:

  • Which employees/staff members have access to this confidential information?
  • How has the confidential information been modified, processed or distributed by them?
  • Is there an area/place where this confidential information could be put at risk?

When companies take the time to analyze how confidential information flows within their company, they can quickly determine which identify vulnerabilities may exist.

Step #3: Create, modify and manage access, usage and distribution policies for confidential information
Upon results from a regular risk assessment, companies can create better, more comprehensive distribution policies for their confidential information. It could be modifications to who can access the confidential information, when it’s accessible (a certain time period), and what type of disciplinary actions will occur for violations of these policies. Once these information distribution policies are defined, it’s essential to also implement monitoring and enforcement of all communication paths.

Step #4: Establish a fail-safe enforcement system
Companies should always implement ways in which they can monitor the handling of confidential information. There should be ways to monitor information usage and traffic, while verifying compliance with distribution policies along the way. Employees and staff should be made aware of the enforcement actions for violation of these policies. Monitoring systems must have flexibility and should be able to accurately identify threats, preventing theft from occurring. These monitoring systems should also contain powerful ID capabilities to stop unauthorized traffic.

It’s clear that although most companies do implement security systems, they often fail to thoroughly review incident reports that arise. It’s also easy to miss theft when you don’t extend security to every communication channel.

Keeping confidential information safe should be a long-term project instead of a one-time event. Ideally, it should demand a lot of attention, requires a way to identify sensitive data; understand and modify current business processes; determine appropriate access, build usage and distribution policies; and monitor all methods of communication. It’s apparent that the high cost of not establishing a system to safeguard your confidential information could be the beginning of the end for your business.

Don’t let theft get the best of your business! Contact IntelliShred today for help with shredding or destroying your confidential data. We’ve been in the business for over two decades and our loyal customers will tell you why they value our services.

Prevent Employee Theft

In this volatile work environment, employee theft can cost companies and organizations millions of dollars. The hiring process is challenging, but even when good talent is discovered, companies could still find themselves at an extremely high risk if they don’t put proper protections in place.

Aside from the financial impact, there are other ways in which fraud or theft can damage your business. It could create a negative brand image in the minds of your customers, it could foster a lack of trust in your brand, and a loss of confidence from your investors. Employee theft can make your business lose its integrity and may keep other high-quality talent from considering your company as the ideal workplace.

In data from a recent study by Hiscox, a global specialist insurer, companies that were affected by employee theft lost an average of $1.13 million in 2016. Of all the specific cases studied, funds theft was the most common and represented over one-third of all cases. Of all the industry sectors that were studied, financial services firms had the highest total losses – more than $120 million.

Employee theft is always threat to any organization, regardless of its size or industry. It’s not always easy to detect employee theft, but according to the study, the cases that occurred were most often where an employee repeatedly diverted small sums of money over time. About one-quarter of the time, the employee theft was taking place for a time period longer than five years.

Companies spend large amounts of money on protecting their data – and it’s definitely a worthy investment. Monitoring computer networks, confidential and proprietary data and trade secrets is essential and a priority to safeguard. However, often times, hardcopy information, sensitive documents and other paper items are not properly protected, and even neglected. It’s crucial that every business keeps tabs on confidential data, regardless of the format it is kept in. Why shred documents? Paper documents can easily end up in the wrong hands and ultimately ruin your business, if not properly shredded and destroyed.

A professional shredding service can handle a significant volume of paper in a safe, secure manner and your important files can be eliminated without the need for removing staples, paper clips, rubber bands, etc. They provide your business with a certified destruction process that involves security cameras, monitors and other specialized equipment.

Whatever volume of shredded material your business generates, an experienced professional shredding service will set a schedule to collect and shred it onsite at your premises. Documents should be shredded in accordance with NAID AAA standards and a Certificate of Destruction will verify the process has been completed correctly.

There’s a way to prevent employee theft – call IntelliShred! We have had years of success with handling professional shredding for a variety of businesses. We are able to provide you with efficient and secure shredding services for paper and even digital media storage devices. Contact us today for answers to all of your shredding questions.

Information Security Risks

There are many risks a company could face over its lifespan. The most dangerous risks include an information security breach, corporate identity theft, or the stealing of trade secrets and proprietary data. Managing confidential or sensitive information is necessary for every business to succeed. Identity theft, security breaches and the potential disclosure of proprietary information are all threats that most businesses may not easily overcome.

It’s essential that all businesses, manage the destruction and disposal of documents and digital storage devices in order to avoid facing these risks. Although this could happen to any type or size business, the sectors that are the most at risk for information security issues are: Financial, Healthcare, Educational, and Government.

It’s crucial for every organization to put an information security policy in place. As part of this policy, there should be regular communication sent to your employees to help them follow the confidential information disposal practices you have implemented.

Here are four ways your company can avoid facing information security risks:

  1. Shred and destroy confidential information regularly.
    There’s a variety of confidential and proprietary information that every company must retain. Everything from product prototypes, price lists, and customer data, to client proposals, email lists, research data. If this information is not reviewed regularly and destroyed, your business could face horrible consequences. It’s best to implement a regular business records retention schedule throughout the year so that you may be able to avoid any risk of theft.
  2. Review your business records every quarter.
    It’s best to have a regular review of your business records so that any information that can be disposed of is identified quickly and then shredded and destroyed. Thieves will look for all kinds of documents, and whatever important information they can get their hands on. If sensitive information is not disposed of properly, there is increased risk of liability for your company.
  3. Do not recycle any confidential information.
    Although recycling is an honorable thing, some recycling companies do not properly screen their employees. The environment in which they work is not always monitored effectively, so there is room for theft. Recycled paper customers may not receive their order right away and your sensitive documents could be sitting in a warehouse for weeks or months.
  4. Make sure you hire the best shredding and destruction service.

Choosing a document destruction company can be challenging, but it’s easier if you know what to look for. It’s best to hire a service which provides a certificate of destruction – this gives you peace of mind that your business is in compliance. Be sure to find a certified professional who’s is also accredited by the NAID (National Association for Information Destruction). That way, if an identity theft case ever surfaces, your business will not be held liable.

Hiring a professional shredding service will definitely help you avoid information security risks. If you put a regular shredding/destruction process in place, your business will be protected. IntelliShred has been helping businesses do just that for over two decades. We have been awarded the highest security rating, “AAA Certified” by the National Association for Information Destruction (NAID). Contact us today to find out more information on how we can assist you.