Posts Tagged ‘trusted identities’

Destruction means business!

Reprint: Boston Globe
Jonathan Wiggs/Globe Staff

PCS co-owner Lisa Bacewicz with “The Green Monster.”
By Paul E. Kandarian, Globe Correspondent February 15, 2015

Got unwanted high-tech gear laying about, such as old computers, printers, cellphones, and hard drives, and not sure what to do with them? PCS of Massachusetts (PCS MASS), a Weymouth company started in 2005 by Lisa Bacewicz and her husband, Charles, shreds old equipment to recycle the material, and also specializes in data destruction. We talked with Lisa Bacewicz for this story.

Q. Why did you start doing this?

A. We were involved in the resale of old electronic equipment, which was a big industry before 2005. But the industry changed rapidly, and obsolete and surplus equipment doesn’t hold the value it used to. That’s why we went to the next stage of responsible recycling.

Q. What do you do?

A. We’re a certified responsible recycler of all electronic waste, including secure and compliant on-site hard drive and data destruction. We take in e-waste from companies. We bring a shredder on a 26-foot box truck, a big green box we call “The Green Monster.” We take custody of the data and provide a videotaped seven-step destruction process. Anything with encrypted data can be shredded, and we can reduce hard drives to pieces the size of your pinky finger. The metal can be refined into new products. We also have a drop-off at our office for people to drop off office-related waste for free, though there is a charge for computer terminals.

Q. Who are your customers?

A. We work all over New England with hospitals, health care facilities, attorneys, major corporations. Everyone in this day and age with an office will have electronics that eventually become obsolete: phone systems, printers, fax machines, power supplies, cords, batteries. Everything can be destroyed and recycled. Any company with regard for client information or personal information should be reaching out to a certified recycler. Most recently, we earned our R2/RIOS certification from Sustainable Electronics Recycling International.

Q. Why is data destruction important?

A. For years, people lacked understanding of what happens to data on hard drives, tapes, or other memory material. Breaches have brought awareness to the point they’re looking for viable, secure ways to destroy data so it doesn’t get into the wrong hands.

Q. Business is good?

A. Extremely. We’re hiring more people, and by the middle of the year will move to a larger facility on the South Shore.

Paul E. Kandarian can be reached at pkandarian@ aol.com.

NEWS

AT&T Fined $52 Million for Dumping E-Scrap

Telecommunications giant AT&T has reached a $52 million settlement with the state of California for illegally dumping scrap electronics in state landfills.
The settlement was announced on Nov. 20 by California’s attorney general and was described by state officials as their first e-scrap management enforcement action against a telecom company.

“This settlement holds AT&T accountable for unlawfully dumping electronic waste. The illegal disposal of hazardous waste can lead to serious environmental and health risks for California communities. AT&T will be required to implement strict compliance measures at its facilities that set an example for other companies to safeguard our communities against hazardous waste.” The settlement calls for the company to pay $23.8 million in fines.

Please call PCS MASS to discuss Responsible Electronics/Components Recycling and Secure On-Site Hard Drive Data Destruction Solutions!

PCS MASS is R2:2013 Certified!

R2/RIOS™ certification is solely for electronics recyclers to demonstrate to customers that electronics equipment is being recycled with the highest standards for environmental protection, worker health and safety, and data privacy, and facility security. A facility that has invested R2/RIOS™ certification has upgraded to the highest, most responsible standards in recycling.

Green thought for the day: Spring is a great time to start your businesses Spring cleaning and get organized for Summer. This means clearing out all those old PC’s that have accumulated over the past few months. Please call PCS of MA today to discuss “Green” Recycling Solutions and Secure On-Site Hard Drive Data Destruction services!

NIST: The Development of Trusted Identities to Secure Critical Infrastructure

In a post on the White House blog, Michael Daniel (a Special Assistant to the President and the Cybersecurity Coordinator recently explained why “the country’s system of passwords as it exists today is hopelessly broken” and what the  the National Strategy for Trusted Identities in Cyberspace (NSTIC) is doing to fix it.

The NSTIC, Daniel says, has called for the creation of an Identity Ecosystem – an online environment in which individuals can trust each other because they follow agreed-upon standards to authenticate their digital identities.

What this means for individual users is that they will be able to choose from a variety of more secure, privacy-enhancing identity solutions that they can use in lieu of passwords for safer, more convenient experiences everywhere they go online.

The NSTIC also helps multiple sectors in the online marketplace, because trusted identities provide a variety of benefits: enhanced security, improved privacy, new types of transactions, reduced costs, and better customer service. The National Institute of Standards and Technology (NIST) is leading implementation of the NSTIC.

In October, the NIST released a preliminary version of the Cybersecurity Framework, which aims to reduce cyber risks to critical infrastructure.  Daniel explains the framework alongside an executive order from President Obama (Executive Order 13636Improving Critical Infrastructure Cybersecurity,” ) are a pathway to ultimately fixing the problem of identity theft.

While the Executive Order focuses on critical infrastructure, managing identities is a foundational enabler for cybersecurity efforts across all sectors. The NSTIC complements the goals and objectives of President Obama’s Executive Order by promoting the use of trusted identity solutions in lieu of passwords, which will help strengthen the cybersecurity of critical infrastructure. Trusted identities offer owners and operators of critical infrastructure more secure, privacy-enhancing, and easy-to-use solutions to help secure IT systems from potential attack.

This could mean in the future you’d be asked to sign in for any number of accounts or sites using anything from retinal scans, fingerprint-based passwords or most recently thrust into the spotlight with the iPhone 5, facial recognition. The ideas aren’t new, what is is the framework, currently being developed and commented on.

Currently, the NSTIC is facilitating the work of a private sector-led Identity Ecosystem steering group, which is working to develop an Identity Ecosystem Framework in which different market sectors can implement convenient, interoperable, secure, and privacy-enhancing trusted solutions for digital identity, including within critical infrastructure. This group currently has more than 200 members.

Guess what. They’re looking for your input on the preliminary Cybersecurity Framework. You can go to the Federal Register to comment by Dec. 13. (Click here for more information on how to submit comments.)

If you’re looking for a reliable asset disposal service, PCS of Massachusetts is ready and willing to help you recycle your electronics and destroy your data.  PC Survivors of Massachusetts, L.L.C.  (R2) Certified,  86 Finnell Drive Unit 6,Weymouth, MA 02188 /Cell: 781-635-6281 /Office: 781-335-1220 / Fax: 781-335-1499 / www.pcsmass.com

 

11

12 2013