Articles and News

May 9, 2017

We have an upcoming shredding event with AARP. The event is free to the public with a maximum of 3 boxes allowed for shredding.

Where: War Memorial Stadium

When: May 13, 2017  9am-12pm

August 10, 2016

Secure your ID day In partnership with the BBB and Rock Solid Shredding!

Where: BBB Headquarters, 12521 Kanis Rd., Little Rock, AR 72211

When: October 29th from 10am until 2pm.

April 14, 2016
Habitat for Humanity of Central Arkansas (HFHCA) and Rock Solid Shredding will provide advanced recycling services during the “Every Day Is Earth Day” event at Bernice Garden on April 23, 2016. “Every Day Is Earth Day” is a community event to celebrate environmentally friendly practices. The family friendly event will include live music and activities for kids.
March 28, 2016
The destruction of confidential and sensitive information is governed by numerous laws and regulations that require the protection of confidential customer information. Therefore, proper and secure disposal of any personal or confidential customer information is highly important.
February 1, 2016

The rising use of BYOD (bring your own device) to your workspace, and the introduction of wearable technologies in the workplace, will inevitably increase the demand for mobile work apps. With this increased demand, it is easy to speculate that the quality in security frameworks and thorough testing may be sacrificed to carry out speedy delivery, resulting in poor quality devices that can more easily be hacked by criminals.

December 28, 2015

Cleaning out the office can sound like such a daunting task, so much so that many organizations continue to place this task on the backburner. But what happens when you lose confidential personal information because of a messy desk, office, or shelf? That is a potential risk of a data breach.

December 21, 2015

Identity theft is a multibillion dollar industry that is used to fund organized crime. There are two main reasons why secure document shredding is important: to safely dispose of confidential information and to prevent identity theft.

December 14, 2015

A security Framework helps to support and fine tune your IT security system. Many organizations develop IT Security and policies, but they tend to stop once that is completed. But in order for IT Security to be optimized, a well define framework needs to be in place and must be self-tuning all the time.

December 8, 2015

A used computer hard drive contains old email messages, bank account, credit card, and social security numbers; and a host of other personal information.  There are many methods that assume secure hard drive destruction, but the question is which are the most effective, safe, and reliable.

November 30, 2015

 Many employers find it difficult to keep employees on track with understanding and implementing information security practices. To many employees it seems easier to do the bare minimum, but many don’t understand the risk and liability. When an information security breach happens it is not just the employer that is liable, but also the employee. As part of a team that assures security and stability to its consumers, both the employer and employee must uphold the highest regard for security practices.

 

November 23, 2015

According to PwC’s Global State of Information Security Survey 2015, the reported number of security incidents in 2014 rose 48% to 42.8 million. At the same time, it showed global cyber security budgets fell by 4% compared to 2014.

November 16, 2015

In a Ponemon Institute surveyof 567 executives, 43 percent said their business had a data breach in 2014, a 10 percent increase over 2013.The statistics of this survey show that data breach is becoming increasingly more common and costly. No matter the complexity of the data breach, dealing with the breach will be monumentally more challenging if you don’t already have a data breach response plan in place.

 

 

November 9, 2015

For a small business with a limited budget this should be a large concern. Although the public only hears of higher profile data breaches, small businesses make prime targets due to their lack of resources. Small businesses on average have the least protected websites, accounts and network systems.

November 2, 2015

The cost of non-compliance for HIPAA, for example, can range up to 1.5 million dollars.

And according to one data breach Report by the 2014 Identity Theft Resource Center, security breach reports have hit a record high, surpassing 5,000 reported breaches and 675 million records exposed since 2005.

 

October 26, 2015

We use the internet to connect with friends and family, conduct business and rely on many other services, like online banking, shopping and utility services, which are supported with online systems. With so much of our lives integrated with technology, as individuals we must take steps to secure our personal information. Cyber risks can threaten all that we hold dear, like our finances, family, and privacy.

October 14, 2015
The Advanced Recycle Day is a joint partnership between Habitat for Humanity of Pulaski County and Rock Solid Shredding aimed at raising awareness about recycling and reusing materials that would otherwise contribute to landfills.
October 12, 2015

Identity theft crimes continue to sky rocket each year. And with each new crime report, identity theft crimes have remained at the top of the list of consumer complaints file with the Federal Trade Commission.

October 5, 2015

Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.

This principle represents the core requirements of any company towards information security for the safe utilization, flow, and storage of information.

September 28, 2015

It is typical for a company to place secure document shredding on the backburner; some seek to satisfy compliance regulations by purchasing a few in-house shredders and leaving it up to the staff to destroy discarded documents. However, many self-managed shredding solutions are rarely considered an imperative job duty; with these decisions being left to overburdened employees, your company may face greater security risks. Also, a DIY approach does not provide certification of destruction to regulators.

September 21, 2015

It is an organizations necessity to treat privacy as both a compliance and business risk issue. There is an exponential amount of reputational damage that can be done if businesses do not comply with new legislation.  If not done this could ultimately lead to a loss of customers due to privacy breaches.

September 14, 2015

  Researchers suggest that about 30% of time is wasted in the office trying to find misplaced information.

September 8, 2015
4 Myths about security breaches everyone should know!
September 24, 2013
Shredding is an easy, straight-forward, and low cost method for destroying information.