The Leading News & Information Service For The Facilities, Workplace & Built Environment Community

The Drive to Destruction

09 October 2015 | Updated 01 January 1970
 

Old and disused data devices - hard drives, USBs, tablets, PDAs – can be sent through the post or by tracked courier, to Send & Destroy’s Hampshire-based facility to be asset listed, destroyed and recycled. An official Certificate of Destruction is provided as proof of secure disposal.

According to recent reports, the worst data breach incidents are costing UK businesses between £1.5 million and £3m on average through business disruption, lost sales and assets and damage to reputation.

In 2010 Brighton and Sussex University Hospitals NHS Trust was imposed with a fine for £325,000 after sensitive data of thousands of people was discovered on hard drives sold on eBay after a contractor failed to destroy 232 decommissioned drives.

More recently, the personal details of 30,000 Barclays customers, said to be missing for seven years, were discovered on a memory stick during a police raid.

But the biggest cost to businesses stemming from a data breach incident relate to business disruption caused by those incidents, with costs ranging from between £800,000 and £2.1m on average for disruption spanning four to 11 days.

Send & Destroy is part of established electrical and electronic waste management company, iWaste. It is licensed and approved by the Environment Agency and the ICO, with clients including the NHS, Odeon Cinemas and 3M UK. Every item of waste received is recycled, helping to reduce the estimated 2.5 million tonnes of electronic waste thrown into landfill by UK households and businesses every year.

Company director, Sam Mountain, saw a gap in the market for flexible, low cost data destruction, he says: “Most businesses have a glut of disused electronic equipment hanging around without knowing what to do with it or whether it holds sensitive information that could be catastrophic if it fell into the wrong hands. For many there isn’t the significant budget available for modern destruction services. Taking it to the local unsecure Waste Recycling Centre is not the answer.”

 *SOURCE: PwC Report 2015. 

Article written by Robin Snow | Published 09 October 2015

Share



Related Articles

Logins Could be a Rotten Affair

Relying on 'auto-fill' to complete the login process for websites as well as storing bank card details to shopping sites such as eBay and Amazon can make for...

 Read Full Article
Demise and Rebirth of Data Dave

Richardson Eyres has launched The Unfortunate Demise and Rebirth of Data Dave which is a short video that follows the lovable and wildly unlucky Data Dave who, despite...

 Read Full Article
Passwords for Dummies

SplashData has announced the 2015 edition of its annual Worst Passwords List highlighting the insecure password habits of Internet users. '123456' and...

 Read Full Article
Don't Get Hacked Off by Dodgy Readers

Vulnerable PDF readers are the primary cause of risk exposure on UK PCs according to the latest Secunia Quarterly Country Report. The international supplier of...

 Read Full Article
Getting the Better of Spams

According to Mailprotector, the Cloud-based e-mail security, management and hosting specialist, the number one spam subject is the simple one-word 'Hi!' closely...

 Read Full Article
Looking for the Weakest Link

It may be difficult to accept but when it comes to IT security the workforce can be leaking vital information. The warning comes from Wick Hill Group, specialist in...

 Read Full Article
What Are You Doing To Welcome The Most Agile Working Generation Yet?

In this guest post, Luis De Souza provides some interesting insights on accommodating Generation Z into the workplace. De Souza is the CEO of NFS Technology Group,...

 Read Full Article
Productivity, Wellbeing, Agile Working - It's Time For The Talking To Stop

Can we really design our workplaces for better behaviours? asks Luis De Souza. I’ve studied the evolution of the workplace for many years – and...

 Read Full Article
On Trend - Can Hackers Turn The Heat Off?

Ken Munro of Pan Test Partners has written a blog - the original of which and more pictures can be accessed if you Click Here  Munro says he has found...

 Read Full Article
Top 10 IT Security Predictions for 2018

As the headline implies...in fact, blatantly states, we have the top ten IT security predictions - courtesy of Ian Kilpatrick.   1. Security blossoms in the...

 Read Full Article