{"id":102,"date":"2005-06-21T00:00:00","date_gmt":"2005-06-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/06\/21\/secure-your-shredding\/"},"modified":"2021-12-30T11:36:31","modified_gmt":"2021-12-30T11:36:31","slug":"secure-your-shredding","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/06\/21\/secure-your-shredding\/","title":{"rendered":"Secure Your Shredding"},"content":{"rendered":"<p>For years, companies have been routinely shredding physical documents to ensure that confidential and sensitive information doesn&#8217;t fall into the hands of competitors.  New technologies are making it increasingly easy to reconstruct virtually any document, and if you are worried about the security of sensitive material, you should know a little bit about document shredding and document reconstruction.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Shredders themselves come in two basic varieties, strip-cut and crosscut. <\/p>\n<p>A strip-cut shredder cuts the paper into strips ranging from a quarter-inch to a half-inch wide.  Strip-cut machines are more popular because they are usually less expensive, tend to be quite durable and generally shred faster than crosscut models.<\/p>\n<p>With crosscut shredders, documents are cut in two directions, producing very small particles.  Rather than cutting paper into strips, crosscut shredders reduce it to smaller particles&#8212;resembling rectangular confetti and measuring approximately one-quarter inch by 1.5 inches&#8212;and provide much more security than strip-cut machines.  Because the particles are so small, they are self-compacting, reducing overall bulk.<\/p>\n<p>Cody Ford, president and CEO of Houston-based ChurchStreet Technology Inc., had observed the Enron Corp. financial meltdown when he was working at Enron as an IT consultant.  ChurchStreet&#8217;s proprietary Strip-Shred Reconstruction and Cross-Shred Reconstruction suites enable companies to have their shredded documents reconstructed.   With the exception of work done for government intelligence agencies, all client document reconstruction is done on ChurchStreet premises with ChurchStreet&#8217;s equipment.<\/p>\n<p>The process basically works this way: Once ChurchStreet technicians receive document shreds from a client, they determine whether the original document can be salvaged.  With a crosscut reconstruction, it is much more important that the collection bag be as undisturbed as possible, given the amount of shredded data.<\/p>\n<p>Companies that blindly shredded documents in the past must now take a much more formal\u2014and thoughtful\u2014approach to what they want to shred and how they want to shred it. In 2005, nothing is simple in security, especially shredding a piece of paper. <\/p>\n<p>http:\/\/www.eweek.com\/article2\/0,1759,1830203,00.asp?kc=EWRSS03119TX1K0000594<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-102","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=102"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/102\/revisions"}],"predecessor-version":[{"id":2589,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/102\/revisions\/2589"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}