Achievers Award Winners: Cootehill

Secure Information Data Destruction Awards

Our second launch of our Achievers award was held in the Errigal Country House Hotel on the 18th of July in cohesion with our GDPR Breakfast Morning Briefings. We are delighted to award five more organisations with our award for Secure Information and Data Destruction, these companies applied and were successful in our very simple application process. We feel it’s important for us to recognise our best and most committed customers who are dedicated to their responsibilities to end life destruction.

 

The winners on the day was Elm Surgery from Cavan, Monaghan County Council and Link Credit Union; whom had all three Credit Unions entered, Kingscourt Credit Union, Baileborough Credit Union and Moynalty Credit Union. Below are images of the winners from the day.

 

Elm Surgery Receive their award

Mary from Elm Surgery receives her award from Tony Forde

Link Credit Union

Louise Coyle and Carole Mulcahy from Link Credit Union (Kingscourt, Baileborough and Moynalty) receive their award form John Nealon and Tony Forde.

Monaghan County Council Achievers Award

Kim Mc Kenna from Monaghan County Council receives her award from John Nealon and Tony Forde

 

 

Achievers Award Winners

We would like to congratulate of the winners of our Achievers Award. At M1 Documents, we want all our customers to be as serious about their confidential data, as we are about shredding it. So we decided to recognise our very best customers who have shown an outstanding commitment to end life, Information and Data Security through destruction, assisting compliance with data protection laws.

The first of the launch days took place in Dundalk, on the 20th of July in the Lisdoo Restaurant during our GDPR Breakfast Morning Briefing, you can check the whole event out here. The winners on the day was Calmount Pharmacy from Ballymount in Dublin, Centric Health from Dundrum in Dublin and Alliance Insurance from Skerries in Dublin.

We received a fantastic response to these awards, we would like to thank all participants and applicants. These awards are ongoing, if your organisation wants a reward for shredding, email This email address is being protected from spambots. You need JavaScript enabled to view it. today.

 

Here are some of the images of the winners receiving their awards.

 

Valerie Deasy Alliance Insurance

Valerie Deasy from Alliance Insurance receiving her award from John Nealon and Tony Forde

Ahmad Abu Elhayja

Ahmad Abu Elhayja from Calmount Pharmacy receiving his award from John Nealon and Tony Forde

Heather Wilson Centric Health

Heather Wilson from Centric Health receiving her award from John Nealon and Tony Forde

GDPR Breakfast Morning Briefing a Success!

On the 18th and 20th of July, M1 Document Solutions held a GDPR Breakfast Morning Briefing in the Errigal Country House Hotel Cootehill and the Lisdoo Restaurant Dundalk respectively. Over 40 organisations participated in the event over the course of the two days. After the guests enjoyed their breakfast fry, they were briefed on the new General Data Protection Regulations coming into effect on May 25th, 2018. They also had the opportunity to participate in a Q + A at the end of the event, which poised some tricky questions for our speakers- John Nealon and Claire Raftery.

The guests ranged from a mixture of organisations from credit unions, pharmacy’s, insurance brokers, computer suppliers, accountants and solicitors. At the end of the events, we held our Achievers Award presentations to the winners. Some of the comments about the event were very optimistic.

 

“I want to thank you and your team for a very well organised event and for the award, you guys did a great job and the seminar was very well put together and useful.”

 

“Thanks for the complimentary breakfast and the very informative talk on the new GDPR, the set up was very professional and the briefing was fantastic”

 

 Tony Forde    Claire Raftery

 

Tony

Breakfast Morning Briefing GDPR

 

On the 18th and 20th of July, we will be hosting two Breakfast Morning Briefings in both the Errigal Country House Hotel and the Lisdoo Restaurant in Dundalk. The seminar will focus on the implications on the new EU GDPR coming into effect. Some of the objectives is to discuss the key issues from a business perspective and also an insight into dealing with new regulations.

 

We will also be launching our Achievers Award at this event. This event is entirely free, even the breakfast. There has been a great response to this already and positions are filling fast, get in touch to secure your spot today. - You snooze, you lose!

 

Tony

Making the Most of the GDPR Seminar

With the new General Data Protection Reguslation (GDPR) going into effect on the 25th May 2018, it will represent the most significant change in data protection laws that we have ever seen. On the 18th of May, John Nealon, Director of M1 Document Solutions atteneded a special one day seminar in Luxembourg called "Making the Most of the GDPR". This event featured policy makers, regulatory consultants and a number of GDPR experts to explain the new regulation and how it will affect service providers and the organisations they serve.

 

Naid-Europe were the organisers of this seminar, they promoted effective ways to help educate our clients with different strategies relating to GDPR. With the emphasis on Irish companies to focus on their own data procedures and systems to coincide with the new level of standards, we at M1 Document Solutions are now in a position to aid our own customers in this sense.

 

Tony

We are Cyber Essential Certified!

We are now the ONLY shredding company with the UK Government backed certification for Cyber Security in Ireland.

With our range of certifications in the data protection industry, we now focused on ensuring our cyber infrastructure was fully protected. Our level of security in our office is at a high standard, this certification justifies how we demonstrate the appropriate levels of quality assurance processes.

The Cyber Essentials scheme is a cyber security standard, which organisations can be assessed and certified against. It identifies the security controls that an organisation must have in place within their IT systems in order to have confidence that they are addressing cyber security effectively and mitigating the risk from Internet-based threats.

The scheme focuses on the following five essential mitigation strategies within the context of the 10 Steps to Cyber Security guide.

  • Boundary Firewalls and Internet Gateways
  • Secure Configuration
  • Access Control
  • Malware Protection
  • Patch Management

Having achieved a fundamental level of cyber security, we will look further into helping our customers reach ultimate data protection through our own shredding services.

Special thanks to Minister Heather Humphreys TD, the Minister for Arts, Heritage, Regional, Rural and Gaeltacht Affairs for presenting us with this award.

 

Tony

Best Wishes to Dancing Couple in Cappagh GAA Strictly Come Dancing

Louise Nealon and Robert Cheasty will be dancing their hearts out March 4th in the Cappagh GAA, Camogie and Ladies Football Strictly Come Dancing. It is understood the pair have been swapping their football boots for dancing shoes over the last number of weeks in an attempt to take home the prize on March 4th in the Johnstown Estate. Training is well underway as all the couples are getting ready to battle it out on the night.

 

M1 Document Solutions have sponsored the couple in their quest to become the best dancers in town. All money raised for the event will go towards fundraising for the club. We have no doubt that with Louise’s and Rob’s twinkle toes, they will do us proud on the night.

Cappagh GAA

 

 

Tony

Cyber Security Seminar

Find out how to protect your business against new and evolving threats

We are delighted to announce that on Wednesday 8th March a Cyber Security Workshop led by Simon Loughran, the Head of Information Security Services at Certification Europe. This event will involve some of the leading members in cyber security in Ireland and provide businesses with a real insight into the prevention methods available.

With input from John Nealon, M1 Document Solutions and Marc McArdle, Mcardle Computer Supplies, the topics discussed on the day will be based around Cyber Security concerns for SME’s and the reasons behind such attacks. Our previous blog highlighted that cyberattacks in Ireland are on the rise, Simon has extensive knowledge in this area and will reveal some hard-hitting facts about the potential damages caused by these attacks.

 SimonMarcJohn

Simon Loughran, Certifciation Europe.   Marc McArdle, McArdle Office Supplies.   John Nealon, M1 Document Solutions

This Practical Seminar will Include:

  • Information and Cyber Security in Business and SMEs.
  • Cyber Security Certifications and Standards.
  • An Audience Q and A.
  • 5 core areas securing IT Infrastructures and Digital Information
  • Practical Guides and Case Studies

This event is completely FREE and will allow the audience a Q + A session to answer some specific questions about their own business situations.

 

Reserve your FREE place by booking here.

 

This event will run until 12:30pm, with lunch provided.

Book now to avoid disappointment!

 

For your diary

Location: Shirley Arms Hotel, Carrickmacross.

Date: Wednesday the 8th of March

Time: 9:30

 

Tony

 

Top Cyber Risks and Tips for SME’s (Part 2)

Safe and Secure PC Disposal

 

If old PC’s get into the wrong hands, sensitive data still existing inside these old computers can be intercepted and downloaded. You should also ensure that any important or sensitive data that may have been stored on a computer is properly removed. This entails running special ‘data scrubbing’ tools to permanently delete your data. Using the normal ‘delete’ key is normally not sufficient to remove confidential or sensitive data.

 

This form of data leaks are the easiest for cyber-attackers to infiltrate and steal information from. Users tend to dispose of their IT Equipment in an old-fashioned manner, in skips and rubbish bins. Users are not fully aware of the implications of the data that can be acquired from these devices.

 

We at M1 Document Solutions, can help this process of safely and securely destroying PCs and general IT equipment. Take a look at our services here and how we can help your organisation reach peace of mind.

computer recylcing shutterstock 510px

 

Smartphone Security

Modern smartphones have the capacity to hold almost every detail about your life in a single handheld device, and a wide range of tasks can be achieved almost instantaneously. Malicious software such as Trojans, viruses and worms are all names of different kind of threats to target your sensitive information. We will look at the main risks and simple tips on how to combat these threats.

 

Some of the main risks with smartphone security are

  • Smartphone loss or theft
  • Loss of sensitive data
  • Malicious software
  • Unauthorised network access

 

Combat with these simple tips:

  • Enable a pass code to use your smartphone and set it to auto-lock after a few minutes of inactivity.
  • Backup your data using recovery software, usually supplied with the device.
  • Carefully consider the source of any applications you download.
  • Carefully consider the permission to your data required by any application you install.
  • Wherever possible, prevent sensitive data from being stored on your smartphone devices in the first place.
  • Encrypt the data on your smartphone where possible, this can be done in most modern phones, in the settings.

 

References: www.makeitsecure.ie 

 

Tony

Top Cyber Risks and Tips for SME’s

Your businesses most valuable asset is your computers information. Think about it, if you fail to protect this vital information, it can leave a significant impact on your reputation of your business, a drop in overall business value and do you even want to know about the resulting fines?

 

Passwords

Passwords go back to ancient times, it was used by the Roman military to ensure guard watch was secure and a pass ‘code’ was used to control the passing of guards from one quartet to another. In today’s world, it is utilised on a wide variety of computing services. So when you connect, a magic word must be provided to safeguard your entry.

Password Header

In the unfortunate circumstance that someone was to steal or guess your password, this means they would then have access to your files, your e-mail, your funds, confidential information, and much more. They can tamper with sensitive data, send threatening or offensive emails in your name, or subscribe to unwanted services for which you'd have to pay. For these reasons alone, the security of your passwords is one of the most important cornerstones of information security. It can’t be ignored or taken lightly.

 

Cyber hackers use a sophisticated software that can run a script to target your password details. Preventing this is easy;

  • Make sure it can’t be easily guessed
  • Change it immediately if you think someone might know it
  • Change it regularly
  • Do not write it down
  • Never send your password in an email or over the phone
  • Do not have Same password for multiple device

 

A good password can be: a line of a poem or the line of a song, join two unrelated words with a punctuation character and replace vowels with numbers. Storing your password is tricky, perhaps use an encrypted file deep in your database with specific authorised permission to users.

 

Malware

Malware is a generic term, short for "malicious software." Malware refers to software programs intended to harm or do other unwanted actions on a computer system. Destructive malware will utilise popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing weaknesses on systems making their entry quiet and easy.

 

A Trojan is an extremely dangerous program that appears legitimate, but performs some illicit activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game or other utility.

Malware

An example of a dangerous malware is CryptoLocker. This ransomware trojan horse came to life in 2015. This malware encrypts your data and displays a message which states that your private information can be decrypted for a sum of money in a limited time. Though CryptoLocker can be removed by various security solutions, there isn’t any way yet to decrypt the locked files, meaning that your files are lost if you don’t pay the ransom!

 

The signs to look for malware attacks include:

  • Advertising pop-ups that appear every few seconds
  • Extra toolbars in your browser that won't go away
  • Browser going to sites you didn't tell it to go to
  • Unexplained system slowdowns
  • Sudden increase in computer crashes

 

Although there are other reasons why your system might slow down or frequently crash, if you're noticing these obvious indications of malware, your system may have been compromised. Here are some quick tips, to follow to prevent these malicious attacks.

  • Only open email attachments that come from a trusted source and that are expected
  • Delete all unwanted messages without opening
  • Do not click on Web links sent by someone you do not know
  • If a person on your contact list is sending strange messages, files, or web site links, terminate your session
  • Scan all files with an Internet Security solution before transferring them to your system
  • Only transfer files from a well-known source
  • Keep security patches up to date
  • Use the likes of https://www.malwarebytes.com to protect against malware

 

The dept. of Communication, Energy and Natural Resources have extensive support for the public and businesses regarding IT security. MakeITSecure is backed by many leading IT and Tech organisation in Ireland, such as BT, O2, Microsoft and Symantec.

In next week’s blog we will look at Safe and Secure PC Disposal and Smartphone Security.

 

References: Roman Empire, Heimdal Security, Make IT Secure

 

Tony

Cyber Security in Ireland

Last week our blog focused on the cyber-attacks on a global stage, lets break it down into more familiar territory this week and focus on Irelands perspective on these threats.

 

Did you know?

According to PWC (2016), Nearly half (44%) of organisations in Ireland who reported economic crime suffered a cyber-attack in the last two years. This has almost doubled since 2012 (25%) and is substantially higher than the global results (32%). Of those affected by cybercrime in Ireland, nearly one in five (18%) incurred losses of between €92k and €4.6m (Global: 13%). And even more surprisingly: 28% of Irish firms have no operational incident response plan for the impact of a cyber-attack.

The Irish government are aware of these increasingly alarming risks for businesses. In 2016 the Dept. of Communications, Energy and Natural Resources stated with regards to cyber security:  

 “There is pressing risks for businesses and individuals, including the loss or theft of personal or business information, or even the destruction of property.”

 

In 2015, the National Cyber Security Strategy was released. This sets out how Ireland will engage with a dynamic and challenging aspect of developments in digital technology, setting out the Government's approach to facilitating the resilient, safe and secure operation of computer networks and associated infrastructure used by Irish citizens and businesses.

In addition to these developments in digital technology, the Government have developed a programme of education and training. Beginning with a revamped Make IT Secure website to help residents and Small to Medium Enterprises (SME) better protect themselves online. They will also develop a programme of structured exercises for critical national infrastructure owners and for public sector bodies, in partnership with international peers and the academic sector.

 

It is important to consider the possibility of groups resorting to cyber-measures to advance their aims by, for example, launching an attack on and disrupting critical infrastructure. This is an issue of growing concern at EU and International levels, which we highlighted in last week’s blog.

 

Every business should have cyber security and data protection measures in their office.  As the saying goes, Prevention is better than cure. Ensure your organisation has prevention methods in place.

 

Coming up next week, we will look at our ‘top cyber risks and tips for SME’s’ we found when going through the process of becoming Cyber Essential Certified.

 

References: PWC, Taoiseach Statement, National Cyber Security Strategy 2015-2017, Make IT Secure

 

Tony

 

To mark Data Privacy and Protection Day 2017, we will focus on this topic in our upcoming blogs. We have just gone through the ‘Cyber Essentials Certified’ process to become Irelands only Cyber Essential Certified Document Shredding and Hard Drive Destruction company.

Cyber Essentials (CE) is a cyber security certification scheme that offers a sound foundation of basic IT security controls that all types of organisation's can implement and potentially build upon. Implementing these controls can significantly reduce an organisations vulnerability. The scheme specifies five key areas of I.T security control that can help to prevent around 80% of known cyber-attacks. Cyber Essentials is for organisations of all sizes and in all sectors. The Cyber Essentials scheme provides businesses large and small with clarity on good basic cyber security practice.

 

We thought it might be interesting in sharing our experience our experience in becoming cyber aware and the importance of it going forward. To this end, we have decided to construct a series of articles in this area over the coming weeks, focusing around: 

  • Cyber Security in an international and Irish context
  • 5 top tips in moving towards being Cyber aware
  • The importance of secure IT Destruction
  • Our experience in going through the Cyber Essentials Certification programme

 

But first within an international context “Cyber Security” has been identified as a major “Global Risk” according to the World Economic forumA “global risk” is defined as an uncertain event or condition that, if it occurs, can cause significant negative impact for several countries or industries within the next 10 years.  The growing significance of Cyber Security is exemplified with the WEF “Global Risks Landscape 2017”.

Global Risks Graph

 

top 10 global risks

 

To highlight some of the major cyber-attacks in 2016, from the Panda Security website.

  • US Election: Hackers managed to get to many of the emails sent from and to one of the presidential candidates and members of her team.
  • Yahoo data leak: Earlier this year Yahoo admitted to more than 500 million user accounts being stolen from them back in 2013.
  • Major DNS Service Provider: A massive cyber-attack against US DNS service provider Dyn knocked out major websites across the Internet earlier this year. The attack affected several websites, including Netflix, Twitter, Amazon and The New York Times.

 

Imagine this: If you leave the ‘safeguard’ and ‘comfort’ of your home, you can be hit by lethal floods, hurricanes, terrorists and earthquakes. Yet stay inside, browsing on your computer and you could lose all your data and your identity, to somebody across the other side of the world. As ridiculous as these sound, these are the top and mostly likely threats of 2017.  We will look at the most important points to take away from this combined perspective of experts and global decision-makers in the coming weeks.

Feel free to link back to this blog, and coming up in next weeks blog we have: ‘Cyber Security in an Irish Context’.

 

Tony

Clean Desk Policy for 2017

Shredding for the new year? Our own office here at M1 Shredding, has witnessed a major clean up. Our old documents and clustered workspace is now rejuvenated into a clean tidy work area. Just like ourselves, other businesses are experiencing the same new fresh start 2017 brings. As industry leaders in Ireland, we are document disposal experts when it comes to big clear out shreds and regular shred services. Start 2017 with a new year’s resolution; A clean desk policy.

2017 Logo

 

January is one of our busiest months in the shredding business with our mobile shredding lorries on the move all over our little island. If you are residential or business, we cater to all shredding needs, no job too big nor too small. We offer you your big clear out or a small once off option. Enter 2017 renewed with a clean desk space. And… If you need another reason to: a clean desk policy is one of the simplest ways to protect sensitive information and to reduce the risk of a data breach and identity theft.

 

Happy new year to all of our customers!

 

Tony

We are now the ONLY shredding company with the UK Government backed certification for Cyber Security in Ireland.

Cyber Essentials Badge High Res

 

With our range of certifications in the data protection industry, we now focused on ensuring our cyber infrastructure was fully protected. Our level of security in our office is at a high standard, this certification justifies how we demonstrate the appropriate levels of quality assurance processes.

 

The Cyber Essentials scheme is a cyber security standard, which organisations can be assessed and certified against. It identifies the security controls that an organisation must have in place within their IT systems in order to have confidence that they are addressing cyber security effectively and mitigating the risk from Internet-based threats.

 

The scheme focuses on the following five essential mitigation strategies within the context of the 10 Steps to Cyber Security guide.

  • Boundary Firewalls and Internet Gateways
  • Secure Configuration
  • Access Control
  • Malware Protection
  • Patch Management

 

Having achieved a fundamental level of cyber security, we will look further into helping our customers reach ultimate data protection through our own shredding services.

 

Tony

ISIA Awards 2016 ISS FINALIST logo

Our Director John Nealon, represented his secure paper shredding company M1 Document Solutions last weekend at the fantastic 2016 ISIA Awards. Although secure shredding services around the country are envious at us, as we are regularly invited to attend these prestigious events to honour our contribution to security shredding.

We received the second – class honour on the night, for our continuous effort in innovation in security to improve our secure shredding services. Our award came from the new CRM data migration system implemented in our office, which cut significant working hours for our office staff on top of many other benefits.

Document shredding is our game, but in our office, we utilise every business hour so our customers can get that ‘Regulated, Certified Secure Shredding’ as efficient as possible. 

Keep an eye on our news over the next few weeks for more shredding information.

John Nealon and Martin Stairs

John and Rosemary Nealon with Martin Stairs, Security Consultant on the ISIA Committee 

 

Tony

 

 

 

 

        

ISIA Awards 2016 Finalist

 

ISIA Awards Logo

Once again M1 Document Solutions have been selected as a finalist for the 2016 ISIA Awards in the innovation in security category. This award recognises a project manager or team who has taken an innovative approach to security through the introduction of innovative technology or an innovative approach to the application of the security service overall in a way that has benefited the public or business. This recognition only highlights the strides we have taken in recent years to continuously improve the shredding process to make it secure and efficient as possible for our clients.

This prestigious event takes place in the Powerscourt hotel in Wicklow on November 12th. The room will be filled with important security organisations from across Ireland. We are hoping for the award but being a finalist is an achievement in its own. Sooo… fingers crossed M1 Document Solutions takes home the gold!

Update: Check out our other news, to see if we our growing shredding service business became victorious at these awards, click here to find out!

 

Tony

NAID Europe Summit 2016

Your Certified Secure Destruction Company M1 Document Solutions recently attended the 2016 NAID Europe Summit held in Barcelona; the capital city of Catalonia in Spain. Joined with us at this event was industry professionals from across the European continent, all eager to learn about the next generation of industry marketing.

 

With the aid of other respected certified companies, M1 Document Solutions representatives assisted on discussions about topics such as ‘Next Generation Certifications’ and ‘A New Approach to Certification Marketing’. The general propose of this International meeting was focused on coming together as the industry leaders to plan the future of certifications across Europe.

 

Lastly, in future when searching for a Confidential Shredding Company; check first if they are a certified company.

 

Your Checklist:

  • EN15713 Certfication
  • NAID Europe, "AAA" Certified Company
  • Qualsec Certification
  • A member of the Irish Security Industry Association

Or better yet, just call us.! The ONLY company in Ireland covered by all of the above.

  • Our Director, John Nealon is Chairman of Irish Security Industry Association; secure data destruction division.

 

Tony

Louth Business Awards Night 2016

LBA logo 2016

 

The glittering, Black tie event is now the Business event of the year and a highlight in the social calendar in Dundalk and surrounding areas. Over 570 well-dressed guests attended on the night Friday the 14th of October, which included a crowd such as business leaders, local politicians and dignitaries. This was most prestigious event to be at and a fantastic networking opportunity for local businesses.

 

M1 Document Solutions are regular customers with many businesses in Louth and once again we sponsored an award for the best Customer Service in the Professional Services Sector, this award was won by PKF FPM Accountants on the night.

 

A glamourous occasion could not have happened without the staff at the Carrickdale pulling out all the stops for us. The dance floor was lively for the whole night whilst fantastic spot prizes were donated by the local businesses that were much appreciated by the attending guests. 

We look forward to next years date and we are eagelry awaiting our invitation to the event, but in our return we are hoping for a nomination next time.

 

For more information on the awards and how to join, visit https://www.dundalk.ie/awards 

 

Tony

Paper Shredding Service in Cork

“Do you shred in Cork?” is a question we are often asked here in the office. Our Business is built with coverage across ALL of Ireland. We regularly shred in Cork and have many clients there.  We treat Cork as the same as any other county with NO hidden fuel charges.  We can be ready at your door for 09:00 with our mobile shredder ready for action, although it means a very early start for our drivers unfortunately.

Want to know more about our shredding services/prices in Cork? Click “call back” above and our office staff will contact you in on any queries!

Anto

Anthony (M1 Mobile Shredder Operator) was in Cork last week, he generously stopped into the office to answer a few questions about his experiences with the long travels down south.

 

Me: First off Anthony; How long have you been confidentially shredding for M1 Documents?

Anthony: 7 or 8 years, but I have only been in the driving seat since the start of the summer as I passed my C Driving License

 

Me: What is your favourite place in Ireland to shred and why?

Anthony: It would have to be Skerries. The view of the Irish sea as I drive past, especially in the summer there is wind surfing, people fishing and everybody is in a good mood!

 

Me: What time do you have to leave HQ, if you have to be in Cork City for 9am?

Anthony: I leave Castleblayney at 4am, and it takes roughly a 5-hour drive but this includes my break.

 

Me: And what would you take as a break that early in the morning?

Anthony: I would have my trusty flask with me, full of tea and a few slices of brown bread. Nothing too wild.

 

Me: How do you keep entertained on the road, what do you listen to?

Anthony: Definitely don’t listen to you! But I would listen to Today FM, I’m a fan of Ray D’Arcy or Anton Savage. If a have a helper for a big clear out, I could be made listen to him for a while.

 

Me: Lastly, why did you choose to work for M1 Document Solutions Anthony?

Anthony: I started with M1 for work placement all them years ago for John, and he kept me on. We are regarded as a green friendly office, something I am passionate about. Data protection is a buzzword in the media, and this company strives to help other organisations ensure they are following the law while also helping them save time and cut their costs. Another reason too is my colleagues at M1 are very friendly and helpful; the craic is mighty!

 

Tony

Data Destruction Services Guide

ISIA Guide to Procuring Secure Data Destruction Services.

The Irish Security Industry Association ISIA have recently released a guide so that organisations outsourcing their data destruction are provided with advice that they can follow when procuring these services and gives them an understanding of what is considered best practice. The treatment of personal or secure data is an area of high importance to organisations, the reasoning behind why third parties are entrusted to manage the destruction of this confidential data.

 

The members of the Secure Data Destruction of the ISIA recognised this and have worked to develop a guide for organisations who are looking to procure secure data destruction services. When destroying information that an organisation has been holding securely, the organisation needs to ensure that the information is destroyed in an equally secure manner.

 

In a business environment, it can be difficult and time-consuming to gain the required knowledge to determine the correct method of security destroying data when it is ready for disposal. This guidance document breaks it down to precise and clear information.

 

The guidelines provide practical advice that may be used when selecting a Secure Destruction service provider.  Based around the EN 15713 Secure Destruction Standard the ISIA Guide to Procuring Secure Data Destruction Services covers areas such as:

  •       Security Screening of Personnel
  •       Collection and Retention of Confidential Material
  •       Collection Vehicles used for Offsite Destruction
  •       Contracts and Subcontracting –
  •       Mobile Shredding Vehicles used for Onsite Destruction
  •       Material Recycled
  •       Destruction Facility

 

Still confused about what it means to be a fully data protected organisation? - Join our network of cliental and become a regular data destruction customer with us.

 

Tony



facebook
Twitter
Google Plus
LinkedIn
 

Request Instant Quote

Website Email Form

Invalid Input
Invalid Input
Invalid Input
Invalid Input
Security Check
Invalid Input

Latest News

PayPal Logo