News Articles

 

epc-stacked-cube-room-like-this-4x7

Download the Official Press ReleaseDownload the Event Flyer for this Event

Did you know that each person in north america, has an average of at least 6 pieces of ‘idle technology” in their home? Whether it’s an old cell phone, that computer that just “didn’t work one day”, an old stereo system, CD player or printer – everyone’s got something that’s got to go. Well the time is now!

EPC, Inc. is proud to offer YOU another outstanding recycling opportunity via our 2015 “Time to Recycle” Event that let’s you unload your antiquated electronics at EPC’s St. Charles Corporate Headquarters on May 2nd, 2015! Simply gather up your gear, and head to EPC’s St. Charles facility at 3941 Harry S Truman Blvd. and clear out the clutter!

Still not convinced why you should come out?

How about a FREE iPad?

Enter to win it NOW by filling out now by providing the information below: (Note: Your information will not be sold to any 3rd party organization)

Check out the information via the flyer listed below (or download it in PDF format here), and help us spread the word about the most comprehensive recycling effort in the St. Louis area!

This Event is for PERSONAL USE ONLY and all items will be handled according to EPC’s “ZERO LANDFILL POLICY.”

On-Site Hard Drive Shredding:

EPC's Data Destruction Recycling Vehicle in Action! Check It Out In Person!

Our fleet of Data Destruction Recycling Vehicles )The DDRVs) are constantly touring North America to ensure that organizations, businesses and companies of all kinds experience the peace of mind that reliable, affordable, certified mobile Data Destruction offers. On May 2nd, 2015, you’ll be able to have YOUR hard drive shredded into tiny bits by one of our vehicles! It’s the best way to make sure that your personal data doesn’t fall into the wrong hands! You can even get an EPC Certificate of Destruction for just $5, certifying that your hard drive and all data contained therein has been safely destroyed by EPC!

Items that can be accepted include:

can-insert-1

Computers, clicks, stereos, servers, laptops, tablets, cell phones, telephones, speakers, microwaves, printers, toner cartridges, writing of all kinds.

Items that cannot be accepted include:

cant-insert-1

Firearms, any item with Freon, fluorescent bulbs, large home appliances (white goods)

PLEASE NOTE:

All CRT/TVs – $10 Each.

Another Great Bonus:

epc-certificate-sampleCertificates of Destruction are available for all shredded hard drives for just $5 each!

Still have questions? Not sure what you need to do next? Have a strange item and not sure what to do with it? Contact EPC, Inc. today and let us know how we can help you “Clear the Clutter” and make the most of this “Time to Recycle” event!

You spend thousands of dollars and untold hours of time to protect the data in your company– well. Maybe you don’t.

Whether you provide attention to your company’s security or not, be sure to take just a few minutes to download our newest tool to help you understand the important parts of what “Overlooked Security Vulnerabilities” that will change the way you provide time and budget to your company.


The 2014 EPC, Inc. Holiday Giftaway - Thank You for Your Pariicipation!

Our thanks to all of you that took the time to enter in to EPC, Inc.’s 2014 Holiday Giftaway project! Hundreds of shares and thousands of visits made for a very busy and prosperous time inside our Social Media Headquarters and we can’t wait to provide these great gifts to those that won!

epc-giftaway-laptop-wiinner-2014Our first winner – of our Business User Holiday Giftaway: A Dell D630 Laptop – is Remains, Inc: Textile Recycling/Vintage Wholesale in St. Louis, Missouri. Founded in 1981, Remains is a used clothing ^ textile recycler in Stouth St. Louis. They process materials for either reuse in export markets or recycle those materials into the wiper and fiber markets. They’re located at 3340 Morgan Ford Road in St. Louis, MO 63116 and are open from 8am-4pm. Be sure to stop in to understand more about how their business operates and congratulate them on a great win by participating in a one-of-a-kind project on Facebook! You can check out their website at remainsinc.com and don’t forget to ‘Like’ their business presence on Faceboook!

epc-giftaway-i-pad-wiinner-2014Our second and final winner – of an iPad3 for a Home User – inside this year’s 2014 EPC, Inc. Holiday Giftaway is: Mr. Aaron Corson of St. Louis, MO! Aaron, along with a very large count of home users shared our content to score a great iPad3! The iPad3 is the perfect, mobile companion that are also available in EPC, Inc’s 5500sqft Retail Showroom right now! Congratulations, Aaron!

The holidays are the perfect time for all of us to revel in the memories, experiences and family that we all hold so dear. Technology can bring new, and vibrant avenues to remember it all, and we hope that – along with great programs like EPC’s Holiday Giftaways, you’ll visit EPC, Inc. when the time comes to add new technology to your home or business.

Look for more great Giftaways as 2015 arrives and from the entire staff at EPC, Inc. – our thanks to everyone that participated, shared, commented and more during a time of giving that we always find fulfilling.

Happy Holidays, from EPC, Inc.!

5rw-itad-v-auction

From Patrick Mann: ITAD Sales, EPC, Inc.

I’ve lived in Texas my whole life, and if there’s one thing that’s even BIGGER than Texas, it’s the auction industry. When they start doing reality TV programs about things – well -it’s huge. What’s missing though, especially when it comes to business, your data, and the gear you’re trying to find a purpose for (especially when your company is done with it), is some common sense that should be the overriding factor when your company’s reputation and future business influence are concerned.

Recently I consulted a customer on the value of doing business with a company like EPC, and explained the differences and benefits between having an Trusted ITAD/Asset Recovery Partner like EPC, and sending your gear off to the quick-buck auction block. We really are a partner with you throughout the process, we help any way we can using our nation-wide reach.

 True Secure Data Destruction: Sending off your systems, full of sensitive customer or company information to an open bidder during an auction, is more than a nightmare scenario waiting to happen, it is against the law. EPC, Inc. on the other hand is 1.) a certified NAID service provider & BAN e-Steward ready to receive, audit, and completely and securely destroy your data via hard drive wipe or shred

— Proper Disposal of End-of-Life Equipment: Having a trail for future reference (either for inventory or audit purposes) is next to impossible when you consider auctions. With EPC, Inc. an entire, detailed history of each and every asset is provided to help you when the auditors come calling, wondering where system x3497G has gotten to.

 Reduces the Maintenance for Your Company’s IT Staff: Let’s say you’re going to be prudent and remove the information from your systems before you send your units off to auction. That’s a LOT of physical move time, time to destroy data, time to verify what’s in which machine and potential theft of assets in-house. EPC, Inc. provides you with all of these services and more as a matter of course when having them included in our ITAD Asset Recovery Services. Any CPA will love that you have functional, detailed reports that make reviewing what your PC has (and doesn’t have) a dream.

 Targeted Markets Make Moving Your Cleared Gear Easy: At an auction, your information is available, and in the wind the instant the auction is over. With EPC, Inc. after the drive data is security destroyed (via wipe or shred), our retail and wholesale customer base is made up of a very wide variety of targeted markets, making the ability to move your equipment that much easier. The more potential buyers there are, the faster the chance to take advantage of current industry values for your gear happens. In the end, that means that whatever you make back helps to reduce the cost of acquiring EPC’s peace of mind for you and your company or organization.

 Paying the House: When it’s all said and done at an auction of any kind, you’re going to end up paying the auctioneer, the house they work in and more their part of the overall transaction which means that you lose even more value/profit when it comes to selling off your equipment. EPC, Inc. actually helps to ensure that each piece – can be moved for a higher revenue return. Who doesn’t want more money for their product?

These are just some of the things to remember when it comes to making sure that you’re benefitting from a true, value- assed relationship when considering the values of having “An Asset Recovery/ITAD Partner VS. Surplus Auction.”

Do you have one that we missed? Tell us what you think here inside our LinkedIn Discussion area! We’re always interested in hearing from you!

breach-banner-3-12-13-enterpriseFrom Eric Levy: ITAD SalesEPC, Inc.

EPC, Inc, now in its 30th year of business, continues to be a centerpiece of information in regard to Data Security. We have been offering companies of all sizes options that ensure compliance with specific industry standards to help protect a company’s reputation and information. A recent article from DataBreaches.Net shows just how important it is to be compliant.

“Nearly 1 in 4 data breach letter recipients became a victim of identity fraud, with breaches involving Social Security numbers to be the most damaging.”

This is a staggering number and cannot be overlooked.

That means that if your company had an “average sized” Data Breach from a mishandled asset or drive of 554 leaked names*, you would have 139 customers or clients that now have had their entire identity taken from them. This is a process that can take from 3-7 years to reclaim not to mention the untold number of dollars that it will cost YOUR COMPANY to make this happen.

The next time you have retired assets that your boss told you to “get rid of” don’t just think of your potential feel good moment of running into that boss’ office and telling him you got rid of all of those “old” computers and were able to do it for no money. Think about that boss’ reaction when you have to tell him the guy that did it for free just stole you client’s identities and you now have to deal with the absolute costs associated with a breach – along with the unknown costs of lost business.

EPC offers true, peace of mind and for very little time on your part. We offer fluid solutions to fit any company in any industry.

Please feel free to contact EPC and learn more about our Industry leading Data Security operations. We would love to help you review your protocols to make sure you are compliant within your industry.

*The data to describe an average size breach is from 2012. We expect the average size of a breach to continue to grow exponentially for the foreseeable future.

patrick-banner-3-6-13-enterprise

From Patrick Mann: ITAD SalesEPC, Inc.

Whether you’re a property manager, an IT or data center manager, a lessor, or a liquidation manager, when your company charges you with disposition of physical IT assets, there’s little room for error. Because of the unplanned and chaotic nature of the situations that call for IT asset disposition, you’re often up against a hard deadline and a shifting, disorganized environment.

When disposing of IT assets in these situations, your task is to mitigate the risk to your organization and get the job done quickly.

Common situations that call for quick disposition of IT assets include:

• Bankruptcy
• Consolidation
• Merger
• Data center merger
• Downsizing
• Closing a division or data center

Usually, when these situations occur, the property manager or IT manager doesn’t have much time to plan and manage the disposition. In these chaotic situations, often the best approach to asset disposition is to partner with an experienced asset disposition solution provider or equipment re-marketer with the expertise and facilities to handle the logistical challenge.

Here are three things to consider when evaluating a potential asset disposition partner:

• Expertise: Is the solution provider familiar with your equipment? A trained representative can appraise the equipment on site and tell you whether or not it’s worth removing. In some situations, understanding each party’s obligations and liability for data security and the equipment itself will determine the best disposition process. An expert in reverse logistics and asset disposition can help you sort through the different scenarios.

• Ability: It sounds the same as expertise, but it’s not. You can find people who know a lot about reselling equipment, but are they able to utilize company employees and bring in the labor to move the equipment out before your deadline? Do they have certified processes for handling and destroying data? When you’re working with a strict timetable—perhaps you’ve been allocated a certain number of days by a bankruptcy court or your company’s lease is expiring—you need a solution provider who knows the equipment and can move it out quickly and efficiently and ensure data security

• Logistics: Where is the equipment going? How is it getting there? Is it being packed and handled to prevent damage and maintain maximum resale value? Is the chain of custody clear and secure?

• Value: The financial value your organization is getting back through the asset disposition should be an important factor when deciding on a solution provider, but it should not be the only one. Consider all of your costs such as the use of internal resources, transportation to far away facilities, as well risks of data breach or environmental non-compliance. The costs could outweigh the value of the assets themselves. The right asset disposition partner will help you minimize all of the costs and the risks while maximizing the return.

When you’re under the clock because of a merger, bankruptcy, data center closing, or another similar scenario, you don’t want to make mistakes. Partnering with a responsible and experienced IT asset disposition provider can make the difference between a smooth, organized process, and a chaotic, disorganized one.

From Eric Levy: ITAD Sales, EPC, Inc.

EPC, Inc, now in it’s 30th year of business, continues to be a centerpiece of information in regard to Data Security. We have been offering companies of all sizes options that ensure compliance with specific industry standards to help protect companies reputation and information. A recent article from DataBreaches.Net shows just how important it is to be compliant.

“Nearly 1 in 4 data breach letter recipients became a victim of identity fraud, with breaches involving Social Security numbers to be the most damaging.”

This is a staggering number and cannot be overlooked. That means that if your company had an “average sized” Data Breach from a mishandled asset or drive of 554 leaked names*, you would have 139 customers or clients that now have had their entire identity taken from them. This is a process that can take from 3-7 years to reclaim not to mention the untold number of dollars that it will cost YOUR COMPANY to make this happen.

The next time you have retired assets that your boss told you to “get rid of” don’t just think of your potential feel good moment of running into that boss’ office and telling him you got rid of all of those “old” computers and were able to do it for no money. Think about that boss’ reaction when you have to tell him the guy that did it for free just stole you client’s identities and you now have to deal with the absolute costs associated with a breach – along with the unknown costs of lost business. EPC offers true, peace of mind and for very little time on your part. We offer fluid solutions to fit any company in any industry.

Contact EPC and learn more about our Industry-leading Data Security operations. We would love to help you review your protocols to make sure you are compliant within your industry.

*The data to describe an average size breach is from 2012. We expect the average size of a breach to continue to grow exponentially for the foreseeable future.

Please feel free to contact EPC and learn more about our Industry leading Data Security operations. We would love to help you review your protocols to make sure you are compliant within your industry.

Let’s face it: If you can rember 5 phone numbers of even your family members in today’s time (unless it’s part of a jingle), you are on the cusp of being an informational genius at this point.

Today, we as technology-addicted humans put in not just phone numbers, but intimate family-based information, account numbers to insurance and bill-paying outlets of all kinds and most importantly: PASSWORDS to the stuff that helps you and/or your company make money.

But what are you doing to protect that literal electronic treasure trove you have on your phone? A recent article over at CNN.Com (listed below) has found that only one in three smartphone users are using a password to protect their data. That means that 7 people, literally have an open-door policy to – well – anyone. Having just changed phone companies (oddly enough, to the exact same phone, just a different carrier) I realized as I was choosing the passcode for my new technological terror how as a connected IT professional, just how critical it is to have a password in place.

passcode-phone-image

At any one time, I have access to company’s websites, my own websites, personal information of every kind all within a moments touch to help me make my day more productive, and to have one, mobile, digital “place” to get all of the information right now. And THAT’s why there’s a passcode, not only to get “into” my phone, but also the information management software that’s on my phone.

What are YOU and the people (especially your sales staffs) doing to help ensure that if one of their phones, with sensitive customer information were found/stolen? Are you using a password to block instant access to your mobile phone’s content? Read the article via the link below and then tell us here what YOU and your company have implemented to prevent the true nightmare scenario…

“Three of 10 Smartphone Users Don’t Use Passwords” at CNN.Com

With roughly 600,000 computers worldwide infected with the Flashback Trojan is your computer protected? For years many people have had the assumption that if they are using a Mac then they do not have to worry about viruses or malware, but with more people using apple products today you can almost guarantee that they will become the focus of attack. No system is 100% safe from viruses or malware. If you are a home user, do you care if your families pictures are destroyed when your computer becomes unusable do to a virus? Do you care if your tax information and social security number is released online because you have a Trojan on your computer? If you are a corporation you could face serious legal problems if client information is released on the internet. Lucky for you it is not very hard to protect your computer from viruses and malware. Below are just a few free and pay for anti-virus programs that you can use to protect yourself from threats.

Free

Kaspersky – Free Flashback Removal Tool
Kaspersky Download

Avast
Avast Download

Sophos
Sophos Download

ClamXav
ClamXav

Pay For

Norton
Norton Download

McAfee
McAfee Download

While it sounds like something from the movie Enemy of the State, new research from the University of Minnesota College of Science and Engineering indicates that attackers can capture the same information used by cellphone companies to track cellular handsets to pinpoint a target's location. This attack leverages features of the GSM communication stack to perform location tests without the alerting the target.