What Value Does Your Company Place on Their Customer’s Privacy and Livelihood?

From Eric Levy: ITAD SalesEPC, Inc.

EPC, Inc, now in its 30th year of business, continues to be a centerpiece of information in regard to Data Security. We have been offering companies of all sizes options that ensure compliance with specific industry standards to help protect a company’s reputation and information. A recent article from DataBreaches.Net shows just how important it is to be compliant.

“Nearly 1 in 4 data breach letter recipients became a victim of identity fraud, with breaches involving Social Security numbers to be the most damaging.”

This is a staggering number and cannot be overlooked.

That means that if your company had an “average sized” Data Breach from a mishandled asset or drive of 554 leaked names*, you would have 139 customers or clients that now have had their entire identity taken from them. This is a process that can take from 3-7 years to reclaim not to mention the untold number of dollars that it will cost YOUR COMPANY to make this happen.

The next time you have retired assets that your boss told you to “get rid of” don’t just think of your potential feel good moment of running into that boss’ office and telling him you got rid of all of those “old” computers and were able to do it for no money. Think about that boss’ reaction when you have to tell him the guy that did it for free just stole you client’s identities and you now have to deal with the absolute costs associated with a breach – along with the unknown costs of lost business.

EPC offers true, peace of mind and for very little time on your part. We offer fluid solutions to fit any company in any industry.

Please feel free to contact EPC and learn more about our Industry leading Data Security operations. We would love to help you review your protocols to make sure you are compliant within your industry.

*The data to describe an average size breach is from 2012. We expect the average size of a breach to continue to grow exponentially for the foreseeable future.

Shutting Down or Moving? How to Choose the Right Asset Disposition and Remarketing Partner

patrick-banner-3-6-13-enterprise

From Patrick Mann: ITAD SalesEPC, Inc.

Whether you’re a property manager, an IT or data center manager, a lessor, or a liquidation manager, when your company charges you with disposition of physical IT assets, there’s little room for error. Because of the unplanned and chaotic nature of the situations that call for IT asset disposition, you’re often up against a hard deadline and a shifting, disorganized environment.

When disposing of IT assets in these situations, your task is to mitigate the risk to your organization and get the job done quickly.

Common situations that call for quick disposition of IT assets include:

• Bankruptcy
• Consolidation
• Merger
• Data center merger
• Downsizing
• Closing a division or data center

Usually, when these situations occur, the property manager or IT manager doesn’t have much time to plan and manage the disposition. In these chaotic situations, often the best approach to asset disposition is to partner with an experienced asset disposition solution provider or equipment re-marketer with the expertise and facilities to handle the logistical challenge.

Here are three things to consider when evaluating a potential asset disposition partner:

• Expertise: Is the solution provider familiar with your equipment? A trained representative can appraise the equipment on site and tell you whether or not it’s worth removing. In some situations, understanding each party’s obligations and liability for data security and the equipment itself will determine the best disposition process. An expert in reverse logistics and asset disposition can help you sort through the different scenarios.

• Ability: It sounds the same as expertise, but it’s not. You can find people who know a lot about reselling equipment, but are they able to utilize company employees and bring in the labor to move the equipment out before your deadline? Do they have certified processes for handling and destroying data? When you’re working with a strict timetable—perhaps you’ve been allocated a certain number of days by a bankruptcy court or your company’s lease is expiring—you need a solution provider who knows the equipment and can move it out quickly and efficiently and ensure data security

• Logistics: Where is the equipment going? How is it getting there? Is it being packed and handled to prevent damage and maintain maximum resale value? Is the chain of custody clear and secure?

• Value: The financial value your organization is getting back through the asset disposition should be an important factor when deciding on a solution provider, but it should not be the only one. Consider all of your costs such as the use of internal resources, transportation to far away facilities, as well risks of data breach or environmental non-compliance. The costs could outweigh the value of the assets themselves. The right asset disposition partner will help you minimize all of the costs and the risks while maximizing the return.

When you’re under the clock because of a merger, bankruptcy, data center closing, or another similar scenario, you don’t want to make mistakes. Partnering with a responsible and experienced IT asset disposition provider can make the difference between a smooth, organized process, and a chaotic, disorganized one.

Interesting New Numbers on Data Breaches – The Numbers Will Stack Up Against YOUR Company

From Eric Levy: ITAD Sales, EPC, Inc.

EPC, Inc, now in it’s 30th year of business, continues to be a centerpiece of information in regard to Data Security. We have been offering companies of all sizes options that ensure compliance with specific industry standards to help protect companies reputation and information. A recent article from DataBreaches.Net shows just how important it is to be compliant.

“Nearly 1 in 4 data breach letter recipients became a victim of identity fraud, with breaches involving Social Security numbers to be the most damaging.”

This is a staggering number and cannot be overlooked. That means that if your company had an “average sized” Data Breach from a mishandled asset or drive of 554 leaked names*, you would have 139 customers or clients that now have had their entire identity taken from them. This is a process that can take from 3-7 years to reclaim not to mention the untold number of dollars that it will cost YOUR COMPANY to make this happen.

The next time you have retired assets that your boss told you to “get rid of” don’t just think of your potential feel good moment of running into that boss’ office and telling him you got rid of all of those “old” computers and were able to do it for no money. Think about that boss’ reaction when you have to tell him the guy that did it for free just stole you client’s identities and you now have to deal with the absolute costs associated with a breach – along with the unknown costs of lost business. EPC offers true, peace of mind and for very little time on your part. We offer fluid solutions to fit any company in any industry.

Contact EPC and learn more about our Industry-leading Data Security operations. We would love to help you review your protocols to make sure you are compliant within your industry.

*The data to describe an average size breach is from 2012. We expect the average size of a breach to continue to grow exponentially for the foreseeable future.

Please feel free to contact EPC and learn more about our Industry leading Data Security operations. We would love to help you review your protocols to make sure you are compliant within your industry.

How Many Hurdles are In Between a Thief and Your Phone’s Data?

Let’s face it: If you can rember 5 phone numbers of even your family members in today’s time (unless it’s part of a jingle), you are on the cusp of being an informational genius at this point.

Today, we as technology-addicted humans put in not just phone numbers, but intimate family-based information, account numbers to insurance and bill-paying outlets of all kinds and most importantly: PASSWORDS to the stuff that helps you and/or your company make money.

But what are you doing to protect that literal electronic treasure trove you have on your phone? A recent article over at CNN.Com (listed below) has found that only one in three smartphone users are using a password to protect their data. That means that 7 people, literally have an open-door policy to – well – anyone. Having just changed phone companies (oddly enough, to the exact same phone, just a different carrier) I realized as I was choosing the passcode for my new technological terror how as a connected IT professional, just how critical it is to have a password in place.

passcode-phone-image

At any one time, I have access to company’s websites, my own websites, personal information of every kind all within a moments touch to help me make my day more productive, and to have one, mobile, digital “place” to get all of the information right now. And THAT’s why there’s a passcode, not only to get “into” my phone, but also the information management software that’s on my phone.

What are YOU and the people (especially your sales staffs) doing to help ensure that if one of their phones, with sensitive customer information were found/stolen? Are you using a password to block instant access to your mobile phone’s content? Read the article via the link below and then tell us here what YOU and your company have implemented to prevent the true nightmare scenario…

“Three of 10 Smartphone Users Don’t Use Passwords” at CNN.Com

Do I Need Virus Protection For My Apple Computer?

With roughly 600,000 computers worldwide infected with the Flashback Trojan is your computer protected? For years many people have had the assumption that if they are using a Mac then they do not have to worry about viruses or malware, but with more people using apple products today you can almost guarantee that they will become the focus of attack. No system is 100% safe from viruses or malware. If you are a home user, do you care if your families pictures are destroyed when your computer becomes unusable do to a virus? Do you care if your tax information and social security number is released online because you have a Trojan on your computer? If you are a corporation you could face serious legal problems if client information is released on the internet. Lucky for you it is not very hard to protect your computer from viruses and malware. Below are just a few free and pay for anti-virus programs that you can use to protect yourself from threats.

Free

Kaspersky – Free Flashback Removal Tool
Kaspersky Download

Avast
Avast Download

Sophos
Sophos Download

ClamXav
ClamXav

Pay For

Norton
Norton Download

McAfee
McAfee Download

Are Hackers Tracking You via Your Cell Phone?

While it sounds like something from the movie Enemy of the State, new research from the University of Minnesota College of Science and Engineering indicates that attackers can capture the same information used by cellphone companies to track cellular handsets to pinpoint a target’s location. This attack leverages features of the GSM communication stack to perform location tests without the alerting the target.

These location tests are used by cellular providers to find the best path on their networks to route calls and can be accurate to a 10-block area in metropolitan areas. 3rd party access to this data usually requires a warrant. However using commodity hardware and open source technology, the researchers were able to directly capture this information. They did not have to contact the local cellular company for access.

The authors conclude that this formation could be used by oppressive regimes to track down dissidents or for thieves could target a person and identify when they were no longer at their home.

The authors have contacted carriers and phone handset manufactures, such as AT&T and Nokia to discuss mitigation techniques and are working on responsible disclosure statements for cellular service providers.

Source Article:

http://www.sciencedaily.com/releases/2012/02/120216165701.htm#.T0JUDgoV6-4.email

Playbook security hole makes personal information available

RIM PlaybookResearch in Motion just cannot catch a break with their tablet, the Playbook. Not only are sales lagging behind Apple and Android offerings, forcing RIM to cut pricing to $299; but now security researchers have discovered email and other personal information could be stolen via malware. The security weakness is exploited using Playbook Bridge, a software designed to link to a Blackberry phone via Bluetooth. While Bridge protects information in transit, a file readable by any native application on the Playbook contains the users BBM username and password. A rouge application could potentially read this file and use the contained credentials to retrieve any information stored in the user’s BBM account.

RIM has acknowledged the vulnerability and promised a fix in the upcoming Playbook OS 2.0 update, which is due to be released in early February 2011. RIM has also recommended that users avoid installing applications from untrusted sources, which will reduce the risk of exposure.

Source: CIO.com – Email, Personal Information on PlayBook Left Vulnerable to Hackers

5 Strangest Returns to EPC, Inc. – Part 1

EPC, Inc. has been fortunate enough to become a juggernaut in the IT Asset Recovery business and our reputation as one of the best solutions for end-of-life IT equipment continues to grow.

Those of you that consider “IT equipment” computers, printers, servers and more – you’re absolutely right. The vast majority of equipment returned falls into these categories, but you may be surprised what makes its way back to EPC.

First, a bit of background. EPC, Inc. is owned by CSI Leasing, one of the world’s largest IT lessors that provide leased equipment around the globe. Companies will receive, for example, 2,200 new computer systems, and the now off-lease equipment is acquired by EPC, Inc. and sold to schools, businesses, people in our 5,500 sq ft retail showroom – anyone that wants to save money. This “IT Equipment received back off-lease also includes some items you’d have never thought would grace the halls EPC.

Not only does this first of many listings of “weird returns to EPC, Inc.” make for an interesting read, it’s also a great way for those looking for the “out of the ordinary” to find solutions thanks to EPC, Inc.

5.) Medical Centrifuge: Centrifuges are machines that rapidly spin fluids to separate substances of different densities by using centrifugal force to produce a form of artificial gravity. They come in from medical companies of all kinds when medical equipment is upgraded.

4.) X-ray Machine: Yes, those machines that you see inside of hospitals, medical clinics and dentists office across the nation that are taking pictures of bones, screws, metal plates and foreign objects eventually make their way into EPC, Inc.

Read more

A New Year is Upon Us: EPC Closed for New Year…

EPC, Inc. hopes that everyone had a prosperous and memorable Christmas Holiday! EPC will be closing for the New Year Holiday weekend at the end of business Friday December 30th at 6pm, and will reopen Tuesday, January 3rd, 2012.

EPC looks forward to providing more great savings, deals and solutions in 2012 and are appreciative of your time, interest and feedback. Please be sure to visit our New/Social Media streams on the Internet (via Facebook and Twitter )to tell us more about how we can meet your needs. Award-winning customer service is a hallmark of EPC, and we are eager to see what this new year will hold for us in new arenas.

Have a safe and Happy New Year!

EPC Closed for the Christmas Holiday

EPC, Inc. hopes that you and your families will have the best holiday ever! EPC will be closed Saturday December 24th, 25th & 26th, 2011. We will be reopening on December 27th at 9am. Thank you for choosing EPC!