
Security & Trust
An everyday example of shredding security risks:
Jack is unqualified shredder operator. He has to leave the loading-bay doors open because this is a toxic process, but it’ll be okay while he nips off to the loo/vapes/answers his mobile, won’t it?
Okay his 3’s look like 5’s and the pen is leaking but that won’t matter much when admin types up the records, will it?
And it’s not a well paid job but there’s a guy down the pub who said he’d give him twenty quid for a hard drive. That’s okay, isn’t it?
On the other hand . . .
Our data erasure staff are highly trained professionals* with a reputation to protect.
The software they use produces an electronic certificate audit trail as an integral part of the data wiping process.
*an IT expert with 20+ years’ experience, an NHS-trained clinical engineer, and a computer programmer who worked on the world’s first ship simulator.
Regardless of the operating system, file system, or type of machine, our leading-edge, triple overwrite system obliterates the magnetic signature of previous data so that not so much as a bit of data can be recovered.
Compared to modern data erasure, data destruction (shredding) is in the dark ages.