by Bart Porter on December 3, 2012
During the past five-and-a-half years, the Redemtech company blog has operated like a perpetual motion machine, consuming latent energy stemming from a vastly churning and changing IT asset management and disposition industry, while plugging along with topical content that has kept readers informed, enlightened, and, in some cases, amused.
Continue reading "No Words are as Effective as a Rightly Timed Pause" and post comments »
by Bart Porter on November 14, 2012
Recently I encountered an interesting technology blog
that attempted to disclose some of the hazards of electronic waste disposal. While some valid points were made, such as a brief explanation of the toxins commonly found in e-waste, I discovered a much stronger recommendation in the blog to be startling and rather unsettling.
Continue reading "A Different View of 'Out of Sight, Out of Mind'" and post comments »
by Bart Porter on October 12, 2012
If you read the colorful description provided by the official website for the city of Salina, Kansas, you’ll find all indications that it is a progressive regional trade center for the north central region of the state. There are references to a rich history of manufacturing, agriculture and transportation; jobs in educational services, healthcare and retail trades; and a thriving arts community, including a performing arts theater and symphony. This certainly gives the impression that Salina is a modern, up-to-date city.
Continue reading "Toto, I've a Feeling We're Not Securing Data in Kansas Any More" and post comments »
by Jeff Kramer on October 3, 2012
When developing ITAD processes, understanding the world in which that process will operate is critical to achieving asset security. A great way to do this is to remember the concept of process durability. By starting to identify potential sources of process failure, one is forced to clarify the world in which the process lives. A durable process’s design has considered the environment in which they will operate and has accounted for it.
Continue reading "How Durable are Your Risk Mitigation Processes?" and post comments »
by Bart Porter on September 28, 2012
While sitting in the examination chair at my optometrist’s office after undergoing some interesting eye tests one night this week, I noticed that the old eye chart that customarily hung on his wall had been replaced by a computer monitor. I acknowledged the technological update, and he explained that the new addition was superior to the old eye chart that’s been around since the first cave-dwelling eye doctor told a patient “Here, put this rock over one eye and tell me what you see.”
Continue reading "Visit to the Eye Doctor Brings Data Security in View" and post comments »
by Bart Porter on August 31, 2012
Standing atop a mock Eiffel Tower outside of Cincinnati, Ohio, my wife, young daughter and I looked out over the hills toward the Ohio River and tried to figure out where below we were supposed to meet our friends and their young daughter. We’d been given a map by a 10-foot grinning dog when we entered the amusement park, of course, and I was using it to try to figure out the quickest way from the central tower to a roller coaster with one of those disconcerting names intended to intimate those with heart palpitations and dare those with impulsive courage to ride upside down for a while.
Continue reading "I Can Almost See My Data Security from Here" and post comments »
by Jeff Kramer on August 21, 2012
ITAD data destruction and sustainability is a point of policy confluence where taking a broader view of secondary impacts, can deliver positive results in all aspects of the triple bottom line. By focusing on methods that maintain functionality, policies around data destruction can enable broader social, financial, and environmental benefits.
Continue reading "Update ITAD Data Security Strategies to Improve Social Outcome" and post comments »
by Bart Porter on July 19, 2012
Whether it was Cain vehemently denying that he’d killed Abel, or Bart Simpson saying “I didn’t do it” whenever he was caught doing another bad deed, fessing up has always been difficult for people, even though honesty is the best policy. Maybe that’s the reason why so many companies and organizations choose not to reveal significant details of data breaches when they occur and who knows how many others hide their breach incidents altogether.
Continue reading "Greater Transparency Needed When Reporting Data Breaches" and post comments »
by Jeff Kramer on May 8, 2012
You know, I always had disdain for the professors in high school and college who based part of their grade on whether or not you did your homework. It seemed like a way for them to look good without having to really validate the student’s knowledge of the material. I always felt homework was a means to an end. Shouldn’t I truly be scored on the end and not the means? (In case you haven’t inferred it, I was not a fan of homework.)
Continue reading "Regulatory Frameworks Must Adapt to Ensure a Line Can Be Drawn Between Compliance and Ability to Protect Data" and post comments »
by Jeff Kramer on May 1, 2012
I like statistics. They always come through. Absolute truth is not easily obtained, but you can always count on statistics to help you gain insight. In our recent Earth Day survey, we asked respondents questions designed to measure their awareness around the issues associated with e-waste. The results were encouraging.
Continue reading "Survey Reveals Why We Need Security Policies" and post comments »