Skip to content
Contact Us

Posts about Data Security

Filter

resource placeholder SK tes Recognized in the 2024 Gartner® Market Guide for ITAD Services
Data Security, News, Press Releases, Featured, ITAD   SK tes Recognized in the 2024 Gartner® Market Guide for ITAD Services

Nov 11, 2024, Singapore – SK tes, a renowned leader in Information Technology Asset Disposition...

resource placeholder Enhance Cybersecurity in IT Asset Disposal: Best Practices & Standards
Data Security   Enhance Cybersecurity in IT Asset Disposal: Best Practices & Standards

In an era where digitization drives business operations across the globe, the risk of cyber-attacks...

resource placeholder 9 Steps in the On Site Shredding Process
Data Security   9 Steps in the On Site Shredding Process

Data security is of paramount importance to businesses and individuals alike. The on site shredding...

resource placeholder 16 Frequently Asked Questions about On site Shredding
Data Security   16 Frequently Asked Questions about On site Shredding

If you’re looking for a secure and reliable way to dispose of your hard drives, solid-state drives,...

resource placeholder ITAD Data Security: Protecting Sensitive Information During Disposal
Data Security, ITAD   ITAD Data Security: Protecting Sensitive Information During Disposal

With the digital age comes the necessity to store, manage and protect sensitive information. From...

resource placeholder Electric gold: Recovering value from information technology assets
Sustainability, Data Security, ITAM, ITAD, E-Waste   Electric gold: Recovering value from information technology assets

Information Technology and AI is at the forefront of nearly every company's operations. It's...

resource placeholder Understanding NIST 800-88: Clear, Purge, and Destroy Explained
Data Security, ITAM, ITAD   Understanding NIST 800-88: Clear, Purge, and Destroy Explained

In 2023, the average cost of a data breach soared to a record US$4.45 million, as reported by IBM...

resource placeholder How to Ensure Safe Data Disposal: 5 Key Considerations
Data Security   How to Ensure Safe Data Disposal: 5 Key Considerations

Every business works with data stored on tapes, hard disks and other electronic media devices. In...

resource placeholder What you need to know about data protection and disposal laws
Data Security   What you need to know about data protection and disposal laws

The IBM Security Cost Of A Data Breach Report 2020 states that the global average cost of a data...

resource placeholder Hard Drive & SSD Destruction | Shredding or Degaussing?
Data Security   Hard Drive & SSD Destruction | Shredding or Degaussing?

Despite Solid State Drives (SSDs) becoming mainstream, many businesses are still using dated...

resource placeholder E-Waste in Asia Pacific
Data Security, News   E-Waste in Asia Pacific

IT professionals highlight concerns on potential data breaches, compliance penalties, and...

 

Talk to SK tes about your sustainable technology lifecycle management.

 

FIND OUT MORE