The Role of Hardware Destruction in Cyber Security

The data on our myriad of devices — including computers, cell phones, flash drives and SIM cards — must have done something very right because they appear to have been granted eternal life. Seriously. No matter how many how-to articles we read or friends who assure us they “know how to wipe it,” data has a way of coming back to haunt us. The technology and electronics experts at CNET report that, with the right tools, data can be recovered, even after we believe it’s been wiped away.

The ability to restore old data may make the job of prosecutors a little easier in a RICO case and that’s something most of us can live with. What we don’t want to deal with is the way bad guys (and gals) can mine private information about us simply by having access to any one of our devices.

Who among us wants someone else to know the passwords to every online site we visit or, for that matter, which online sites we visit? Who wants to expose the names and phone numbers of their friends, family and business associates? Who wants to share photos and videos that were meant to be private?

With so little privacy in this world already, the least we can do is protect our personal and business information from those who would try to exploit it for their own gains. Like Jimi Hendrix and his guitar at the Monterey Pop Festival, the only answer is destruction — the total and complete destruction of all that information-rich hardware.

What we do is take all those outdated electronics — like iPads, cell phones and computers — and pulverize them. By the time we’re done, they are literally laid to waste and no one, no matter how talented, could possibly access the information contained within. Magnetic tapes, CDs, DVDs, SIM cards, old floppy discs and hard drives — we render them useless. We accomplish this by using state-of-the art equipment to shred the items and turn them in nothing more than scrap metal. And in order to be environmentally responsible, the scrap metal is then recycled and used to produce other products rather than end up in a landfill.

If you’re considering having your old hardware destroyed, there are two more things you should know. The first is that we are a trusted member of the National Association for Information Destruction (NAID), meaning you can trust us to follow the strictest possible standards. And finally, our mobile shredding unit makes it possible for you to witness the entire process from start to finish.

Although we are proud of our services, the most important thing we offer you is peace of mind. You will never have to worry that someone has access to your information who should not have it. Visit www.TristarShredding.com for more information or contact us today and let us help you keep your private life private.