Reduce support costs by up to 70%

Customizable Service Levels Adjust service levels or add and delete equipment from your Sever Storage And Network maintenance contract at any time.

Convert!

Top ITAD And Data Security Tips For Working Remotely During Covid-19

Due to the global Covid-19 pandemic and the unparalleled challenges caused by the novel Coronavirus, enterprises, governmental agencies, and other organizations have adopted work-at-home protocols for many of their employees. Ideally, these groups will adapt to such changes and steps consistent with social distancing without any significant lapses in service level or employee performance.

With the lessons learned from this unprecedented time, some experts believe that more organizations will incorporate additional work-at-home policies and methods in the future for their remote employees. But for now, the experience is an emergency adjustment driven by the need to provide employees with a safe, healthy working environment.

Organizations usually construct emergency protocols and contingencies into their respective game plans to handle most potential challenges. Few anticipated the extent and all-encompassing effects of the current circumstances caused by the Covid-19.

One aspect of the work-at-home situation that should be taken into consideration is the potential for security breaches resulting from reduced direct data security oversight and inadequate IT Asset Disposition (ITAD) processes to secure the accessed data.

Adding to the risk, many team members are using personal equipment from home, perhaps due to a shortage of company-owned equipment.

The security risks of employees using personal devices for work without the proper controls are substantial. Consider these liabilities:

  • Data Risks: If an employee loses their personal smartphone or PC, the company data stored within it is at risk.
  • Malware: The potential for devices that are used for both personal and business increases the equipment's vulnerability to attack and malware.
  • Exposure to Unauthorized Cloud Services: Devices that operate outside of the enterprise's cloud environment increase data theft potential.
  • Security Breaches: Maintaining confidential company documents and contractual agreements, along with personal information, may expose the company to government enforcement or civil penalties related to data breaches.

Here are some strategies for companies to minimize the potential for data compromise and other issues while permitting employees to use personal devices while offsite.

  • Create an All-Inclusive Register of Assets

Companies may not have enough equipment, laptops, or tablets on hand to accommodate this sudden shift of employees working remotely. Lead-times for new equipment have lengthened due to the crisis, and, in some instances, companies cannot afford the additional capital expenditure to keep things running smoothly.

With each additional device operating independently in a system, the potential for a data breach, criminal intrusion, or malware intrusions increases exponentially.

The first step is to make sure all devices, company or employee-owned, are included in the company's asset register. This procedure allows for oversight and secure authentication to access internal data. Registration also enables the IT asset management personnel to remove access if an employee leaves the organization.

  • Specific Cloud Services Access

Remote access increases the need for enterprises to adopt cloud-based service access. Maintaining all information in a secure cloud format allows authorized personnel access anything from anywhere. Access is particularly important when employees are scattered about in multiple locations.

IT management should select a single cloud provider with very secure access. Even though employees may be using personal equipment, they should only operate within the designated cloud environment. The use of personal cloud services may expose essential data to outsiders.

  • Observe GDPR at All Times

General Data Protection Regulations (GDPR) are enforceable at all times for all employees, especially if they are working remotely with personal equipment. To avoid data breaches, the company should have a central control body to classify which documents and information may be accessible to specific individuals from their personal devices.

  • Sanitize Personal Equipment When No Longer in Use

Whenever company assets replace the personal equipment, each non-company device must be wiped clean of any company data or digitalized records, and access must be eliminated. Sanitizing personal equipment is essential also whenever an employee is issued a company device, returns to the workplace, or leaves the company.

All company documents and data should be carefully removed from personal desktop computers or laptops, tablets, or smartphone.

Organizations should establish clear procedures for staff to immediately clean the equipment to ensure that no sensitive company information remains.

An Ohio-based IT enterprise, thomastech LLC offers a complete menu of IT support services for new and existing clients. A proven third-party IT support and maintenance company, thomastech provides secure and reliable support worldwide, featuring:

  • Secure data and malware protection
  • Specific Cloud services
  • Sanitization of equipment no longer on the company register
  • Ongoing enforcement of GDPR (General Data Protection Regulations)
  • Remote maintenance and security updates

Contact thomastech, the Premiere Choice for Third-Party Maintenance, to Evaluate Remote Workers and Team Issues

thomastech services are scalable and can be tailored to fit your company’s specific needs and projects.

If organizations operate remotely and have extended global reach, working with a company like thomastech, a proven third-party maintenance company, to meet industry demands and keep all entities in sync and running smoothly are essential; undoubtedly, such an opportunity will save you time and money.

thomastech provides effective, secure, and ongoing IT maintenance support for companies in the U.S. and across Europe and various countries. To arrange a confidential discussion and a quality evaluation with one of our experts, visit the thomastech website or call us at (330) 225-3117.

Hitachi VSP 5600

1

The Hitachi Virtual Storage Platform 5000 series is a data storage solution for enterprises that supports block, file, and mainframe applications. It includes the Hitachi Ops Center management software suite for efficiency, data security, enhanced analytics, and centralised administration. The VSP series 5000 have Max. Number of drivers, including spares- 33 NVMe SCM, 96 NVMe and 768 SFF SSD. To accommodate up to 33 million IOPS and 69PB of data, Hitachi Accelerated Fabric can scale from twin controllers with quad CPUs to 12 controllers with 24 CPUs. It has a lightning-fast 39μs Minimum Response Time. Due to the controller architecture, scaling up the system results in a more resilient solution and provides 99.999999 per cent data availability. Additionally, the platform supports various media types combined on the same storage platform, including SAS FMD, SSD, HDD to NVMe SSD, and SCM media.

Hitachi VSP 5200

1

The Hitachi Virtual Storage Platform 5000 series is a data storage solution for enterprises that supports block, file, and mainframe applications. It includes the Hitachi Ops Center management software suite for efficiency, data security, enhanced analytics, and centralised administration. The VSP series 5000 have Max. Number of drivers, including spares- 33 NVMe SCM, 96 NVMe and 768 SFF SSD. To accommodate up to 33 million IOPS and 69PB of data, Hitachi Accelerated Fabric can scale from twin controllers with quad CPUs to 12 controllers with 24 CPUs. It has a lightning-fast 39μs Minimum Response Time. Due to the controller architecture, scaling up the system results in a more resilient solution and provides 99.999999 per cent data availability. Additionally, the platform supports various media types combined on the same storage platform, including SAS FMD, SSD, HDD to NVMe SSD, and SCM media.

Hitachi DS7160

1

With a maximum of 16 Intel Xeon 8276L CPUs and up to 12TB of memory, the Hitachi Advanced Server DS7160 is a powerful server. Mother Board Revision: 12001509-006 BIOS/uEFI: UEFI: BIOS_PUR043.37.14.121 (06/02/2020) CPU: 16 Intel Xeon® Platinum 8276L Processor 2.20 GHz RAM: 12 TB Ports and Bus Types: 3 USB Ports 40 PCI Express X8 8 PCI Express X16 Video Adapter: Matrox Graphics Inc. G200 SE A (PCI) Host Bus Adapter: Emulex Corporation LPe31004 FC (Quad Port) , FibreChannel LSI Logic SAS 9300-8i , Serial SCSI (SAS) Emulex Corporation LPe31002 FC (Dual-Port) , FibreChannel LSI Logic MegaRAID SAS 9361-8i , Serial SCSI (SAS) Broadcom® SAS 9300-8E Host Bus Adapter , Serial SCSI (SAS) Emulex Corporation LightPulse LPe12002 8Gb/s Fibre Channel PCI Express , FibreChannel Intel X99 Chipset (DHX99 PCH) , Serial ATA (SATA) Hard Disk Drive: 2 SanDisk SDLF1DAM-400G , Serial ATA (SATA) 6 HGST Ultrastar SS300 (HUSMM3240ASS204) , Serial SCSI (SAS) Seagate® Enterprise Capacity 3.5 HDD v4 SAS, 4TB (ST4000NM0034) , Serial SCSI (SAS) Storage Area Network (SAN) Device: Hitachi Data Systems Hitachi Universal Storage Platform V

Let's chat over a brew.

Coffee, tea, or strong espresso...

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.