Guidance Protect 8

Guidance Note:

One of the easiest ways for malevolent third parties to access company data is by stealing data which has not been disposed of correctly even when deemed obsolete.

------

When you throw devices that contain information away, they can still be accessed. This has to be stopped in advance by making sure that the information is properly wiped away.