Our job is simple…keep our customers secure from cybercriminals, provide you with easy access to services and solutions that can help mitigate threats.
Simply send us your hard drive and mobile device or we can collect for you, we get them back to our office and enjoy the demolition. We then send you a Certificate of Destruction confirming total annihilation of your sensitive data and devices.
If you would like a souvenir, we can even send you back the remnants of your devices!
Yes. There are criminals out there who want your old machines for the hard drives and the sensitive data that could be held upon them. Why risk stealing a machine and being caught by the police or even hacking on to your network and be traced when throwing away your computer with the hard drive is like handing it to them? Shredding your hard drive with Greenpoint Computer Services guarantees impossible data recovery!
You should also consider that there are several laws and legislation that you’re either required to follow as the owner of a device which stores data or strongly recommended to abide by:
Certain materials need to be disposed of safely to prevent needless pollution.
Cybercriminals can easily make considerable amounts of money by removing personal information from your hard disks and either selling it on to other criminals or using it themselves.
With enough information, criminals can assume another person’s identity and amass significant amounts of debt in their victims’ name before ever risking discovery.
If the criminal can capture passwords, they can log on to computer networks and steal information, steal payment details, adjust documentation etc. By simply changing the bank details on your invoices before you send them out, criminals can receive payments directly from your customers. They will be long gone before you have noticed that you haven’t received the payment for the invoice.
This also risks damaging your relationships with your customers when you start chasing a payment that they have technically already made. (Its not their fault that the details on ‘YOUR’ invoice were incorrect). If you are lucky and the customer paid via Credit card, you could potentially receive the money once their insurance pays out against their lose. Otherwise, you may have to claim against your own insurance or worst-case scenario, if you do not have a policy that covers cybercrime, you may be forced to absorb the loss.
There are a few important reasons to dispose of computer equipment correctly. For example, the information held on a computer’s hard drive can include sensitive information such as:
Cybercriminals can easily make considerable amounts of money by removing this information and either selling it on to other criminals or using it themselves.
Yes. Even if the criminals disposed of the physical hard drives after removing the data from them, there are still ways that the data from the drives can be traced back to you and your business. The police and anti-cybercrime forces have amassed significant experience and procedures in fighting cyber criminals over the years. The investigative processes that they have developed much like the old sherlock Holmes concept, ‘Once you eliminate the impossible, whatever remains, no matter how improbable, must be the truth’. It may take time, but they will eventually uncover linking factors between the victims.
For example, if a linking factor between each of the victims is that they have been recent or regular customers of yours, then your business will enter the firing line. The investigation will discover that you have recently changed hardware and they will ask how you disposed of your old machines. When you have been found negligent of disposing of the hard drives correctly, it will leave you liable for paying for the loses of every victim of the cybercriminal that can be proven to be connected to you. When considering that the average victim of a cybercrime loses $149K (roughly £132K) – (source Kaspersky Lab / B2B International 2018). These kinds of figures could put even the strongest company out of business.
Wiping the hard drives is often not enough to prevent criminals from getting to the information. There are hackers out there with the capability to recover data from a hard drive that has been subject to MOD approved wiping. You wouldn’t be alone in thinking that writing new data over the top and wiping it again would be sufficiently secure but even this can still leave retrievable data behind that skilled hackers can take advantage of.
There are a few methods of disposing of hard drives securely and safely, but some offer more risks than others. Greenpoint recommends that you destroy the hard drive. Greenpoint’s shredder, The Instagator, is MOD approved and shreds hard drives up to 3.5” in thickness. We then recycle what remains. Shedding the hard drive leaves nothing behind for the criminals to examine, even with the extremes of programming skill. You can rest assured that no information will ever get into the wrong hands.
You can choose to drop the hard drives in to our head office, or alternatively, one of our trusted staff will come to retrieve the hard drive(s) from you. We will provide a certificate of destruction as proof that you are no longer liable. Bringing the hard drives to us ensures that there are no other links in the chain (i.e. couriers / postal service) and you can be assured that no one other than you appointed staff members and out trusted staff ever have access to your hard drives and anything sensitive upon it.
If you hold particularly sensitive data or too many hard drives to transport easily, Greenpoint will send a trusted member of staff out in a van to bring the shredder to you. This gives you even greater piece of mind of knowing that the hard drives and information upon it, never leaves your property / premises until after it has been irreparably destroyed. If you choose this option, you still receive the certificate of destruction
Need Your Hard Drives Disposed Of?
Speak to one of Greenpoint’s experts for 60 minutes free of charge.