Getting Ready for 2020

2020 is fast approaching. Rather than leaving things to the last minute, now is the time to begin your end of year clear-out. What needs to be shredded and what needs to be kept in storage? As a general rule, older archives past the 7-year date mark should be destroyed. This whole process can be overwhelming and time consuming however in order to keep the procedure as time efficient and simple as possible there are a few questions you should ask yourself.

Office Documents in Boxes
  • What is the type of data?
  • Why do you have it? Do you really need it? Is it easy to get that information again if you need it down the line?
  • Where is it kept? Is it kept in filing cabinets? Or is it digitally saved?
  • When was it acquired? Has it been over 7 years ago? Is it time to remove it from your records?
  • Who has access to it?
Organised documents

Answering these questions should provide you with the necessary solutions you need in order to keep compliant with the GDPR. When asking yourself these questions it is important to consider all forms of data; confidential paper, hard-drives and media devices, or branded products such as business cards or uniforms etc. Once all this is organised it is time to contact your trusted shredding company who can provide you with options for the certified destruction of your data.

The sooner you begin; the sooner you are ready for the new year.

Onsite Document Shredding Available Near You

Security in Shredding Confidential Paper Shredding

Confidential document shredding services, document & product destruction are services available through Security In Shredding. Our quality service provides security and confidentiality to document destruction services.

Security In Shredding are specialists in confidential documents & product destruction services. We regularly provide these services to government departments, public and private companies as well as home owners throughout the Republic of Ireland.

Onsite shredding is internationally recognised as the most secure method of destroying sensitive and confidential paperwork. Shredding to a Din level 6 is a security standard which is vital for the security of data destruction.

Available Near You!

Security In Shredding on site shredding trucks are available in the Republic of Ireland. A once off large shred is available or scheduled of on call services are also available to suit your needs.

We offer a range of destruction solutions for all your paperwork, hard drives, videos and all electronic office equipment. Fully licensed and NWCP, your confidential material is safe with Security In Shredding. We are a data processor and once we have your documents, it is our responsibility to destroy the documents.

Maintaining confidentiality is essential in today’s business world. Now more than ever data security and data protection is vital for business success. More than for business success, it is the law to protect your data under the data protection act.

We provide our customers with the most secure method of confidential document destruction available, fully transparent with same day shred for collection services.

harddrive destruction, Media Destruction, Confidential Shredding Service

We Destroy Digital Data Devices

Along with protecting confidential paper documents. Your digital data must be protected also. Ignorance and human error are major risks with digital devices. One method that ensures data destruction is to physically destroy the drive. Our IT & Media Data Destruction Systems provide a 100% guaranteed destruction policy.

Call us today for any enquires you may have regarding our Shredding Services and or IT & media destruction, then email us at:

Choosing A Confidential Media Destruction Service In Limerick Area

secure document destruction limerick.

At Security In Shredding we pride ourselves with an up to date and confidential shredding service. Another service on offer is our media destruction service. Media destruction is essential for ensuring data protection and data security for any Limerick businesses or organisations.

Now more than ever data is transferred digitally rather than paper data equivalent. Monitoring digital data and how it is handled is different to paper data. Your computer (digital device) contains a vastly larger amount of data with minimal physical storage being used.

Why Replace and Not Erase?

With time your computer slows down and needs to be updated or replaced. Most people will get rid of the computer without destroying the hard drive. This is a big security vulnerability. You may have deleted all the files from the hard-dive or a memory wipe. This is not enough to ensure the data is destroyed.

The only way to ensure data destruction of the hard drive is to physically destroy or crush it. There is software readily available that can retrieve the erased data. If your company is handling sensitive data then this could be a major data breach against your business or organisation.

Why Choose a Media Destruction Service?

Drilling a hole into the hard drive is an effective method of destroying the device. If your an organisation or business then you may have multiple devices and accessing each hard drive and drilling each one will take time and effort. Not to mention if its a tablet or mobile device that will require specialist tools to access the storage.

Our media destruction service can handle large quantity shredding of hard drives, CDs, DVDs, USB and external drives. Once the shredding is complete you will receive a document of destruction certificate. Shredding the device ensures security and disposing it in the correct recycling steams.

Confidential Document Destruction Service

We strive to ensure our shredding documents and media destruction service are to the highest standard and in compliance with EU directive. Our vans and trucks are available for on site shredding or collection with off site shredding. 

Please contact our staff for any queries regarding our media destruction service.

Email us:

Limerick Businesses Top 5 mistakes after a data breach

secure document destruction limerick.

All organisations that operate throughout Limerick and Ireland will be aware of the risks of data breaches. The negative sentiment of experiencing a data breach affects relationships with your current clients and how others view your organisation. In certain cases your organisation may be legally responsible to your customers as well. Recovering from a data breach is a long but attainable process.

Our paper shredding service in Limerick value data protection and recommend the following steps you can follow after a data breach occurs:

1.    Enlist Expert Help
Depending on the size or type of breach you experience, your organisation may need to enlist external help. While external assistance is an added cost, you should evaluate your options with professional Incident Response teams to determine if an ongoing relationship is needed after the breach has been resolved.

Hiring a Limerick paper shredding service can help protect your organisation from future attacks.

2.    Elect a Leader
Managing a data breach is never an easy task. There are several parties within an organisation that will be responsible for resolving the breach, including IT staff and executive management. Electing a strong leader will help ensure all team members are updated and held responsible for their duties. Any external parties involved in the resolution should also have one point of contact. A strong leader will drive the response plan and keep the organisation and customers updated on all steps taken to resolve the breach.

3.    Communication Plan
Along with electing a strong leader, establishing a communication plan to external parties like the media can help to mitigate negative coverage. Data breaches are increasing in occurrence and major companies have also being targeted (LinkedIn & Electric Ireland).

Responding to these incidents quickly with a detailed action plan has proven to be an effective tactic for organisations to reassure partners and customers that the data breach is being resolved as efficiently as possible. Your organisation should consider drafting statements and other materials to release quickly in light of a data breach.

4.    Waiting for Perfect Information
It may be tempting to wait for the right information from your Incident Response team before taking action against a data breach. However waiting for the right, or “perfect information” can cause delays in meeting certain requirements and communicating to external parties like the media and consumers.

It’s important for your organisation to take action immediately after a breach. Begin executing the first steps in your data breach recovery plan, should your organization have one. It may also be wise to consult with an external partner to get started immediately.

5.    Plan Post Breach
Having a Post Breach Plan of Action is vital to the recovery process. Your organisation should release details on how consumers can contact your organisation to voice their concerns and monitor their financial security, if applicable.

You may also consider investing into additional security measures such as clear out shredding or improved technology to avoid issues in the future. It’s also important to update your internal procedures on managing a data breach, and meeting regularly with your team to ensure everyone is kept up to date.

Our mobile paper shredding service is available and regularly operate throughout all of Limerick and greater Limerick area. For more information on a confidential document destruction service Email us at 

The Data Protection Commissioner phone no: +353 57 868 4800


Data Protection & Data Protection Service

Data protection service AND DATA DESTRUCTION

In today’s world “data is king” and protecting that data is queen. A secure document shredding service provide businesses and organisations with confidentiality and security needed to ensure data is protected. Data breaches can be extremely damaging to your business reputation. Get more details about Secure Data Destruction

What is Data Protection? 

“Data protection is the safeguarding of the privacy rights of individuals in relation to the processing of personal data. The Data Protection Acts 1988 and 2003 confer rights on individuals as well as responsibilities on those persons processing personal data.”


How can I protect my identity?

  •  Keep your documents such as your driving licence, passport, birth or marriage certificate in a safe, preferably in a lockable cabinet or safe.
  • Regularly request a copy of your personal credit file from your financial institute to see if it includes any credit applications you do not recognise.
  • Change of address. You can register with An Post for Irish resident customers (or equivalent if you live outside of Ireland) redirection service to help prevent identity fraud when you move.
  • Be careful in shared buildings, if others have access to your post. Contact An Post if you think your post is being stolen, or redirected elsewhere without your approval.
  •  Avoid throwing documents away which include your name, address or other personal information. Bills, receipts, statements or even unwanted post in your name can be misused in the wrong hands. Where possible, documents should be securely shredded beyond reconstruction, to minimise the risk of criminals obtaining information.
  • Report the loss of any important documentation immediately – for example your passport or driving licence. Inform the organisation that issued it, and if stolen contact the Gardaí.
  • Check your bills and statements as soon as they arrive. If any unfamiliar transactions are listed, contact the company concerned immediately.

How can I spot identity theft?

  • Your bills and statements do not arrive as expected, or you stop receiving any post at all.
  • An important document has been lost or stolen, for example your passport or driving licence.
  • Transactions you do not recognise start appearing on your statements
  • Bills, invoices or receipts addressed to you start arriving, for goods or services you have not requested.
  • You receive statements in your name, relating to accounts that you have not opened.
  • A loan or credit application is unexpectedly rejected despite having a good credit history; or you apply for welfare benefits and are told you are already claiming when you are not.
  • You are contacted by solicitors or debt collectors for debts that are not yours.

What should I do if I think I am a victim of identity theft? 

  • Act quickly. This will help in ensuring you are not liable for any financial losses caused by criminals using your identity.
  • Identify which documents or personal information may be in the wrong hands.
  • Check that you are in receipt of all expected post. Contact An Post if you have any suspicions.
  • If you believe documents containing details of your identity have been stolen, contact your local Gardaí station to report the theft.
  • Contact the organisation who originally issued the missing document to alert them to the situation.
  • Contact other companies that you have financial packages with, to alert them to the situation.

Useful contact details:

The Office of the Data Protection Commissioner

Canal House,Station Road,Portarlington,Co. Laois



An Post

O’Connell Street,Dublin 1,Customer Service Team

Tel: 1850575859.


Department of Foreign Affairs

80 St Stephen’s Green,Dublin 2

Tel: (01) 4780822 LoCall: 1890 426 700


Central Bank of Ireland

PO Box 559, Dame Street,Dublin 2

Tel: +353 1 224 6000


Security in Shredding

Ballyartella, Ballycommon, Nenagh,Co. Tipperary

Tel: 067 24848

For more information on paper shredding services and document destruction please visit out site at:

Why Company’s Need To Address Improper Document & Data Disposal

data destruction and collection service

Secure document shredding specialists deal with physical and digital data on a regular bases. How we handle this data is important to ensure confidentially. Confidential shredding and data protection go hand in hand to prevent data breaches occurring.

It is widely known that employees and hackers are biggest cause of data breaches. There have being high profile hacking cases involving employees inappropriately clicking on links that  permits the hackers access to the organisations network and software system.

In order to have an appropriate confidential document and data disposal system in place, you should firstly contact a service provider whom has ample experience in the industry with a 100% clean track record (i.e. an occurrence of zero data breaches). Such a Data Service Provider will be able to answer all your queries and concerns regarding how to implement a secure and efficient document management system – all the way to end of life documents as well as in-house training of staff and policies and procedures. “At the end of the day, you are relying on employees to manage confidential documents in a secure and confidential manner.”


In order for one to have piece of mind, a training programme should be established for the induction and on-going training (in-house) for the organisations employees. When the employees understand the importance of efficient and accurate Data Management and Data Protection Legislation; it minimises the risk of a data breach.

When the data reaches its end of life, it needs to be securely disposed of. This is where a certified professional Data Processor like Security in Shredding provides (at the clients choice) onsite and/or offsite data destruction. A company such as Security in Shredding are specialists in the entire area of Data Management. They have an unblemished record and provide a professional, certified and recognised data destruction services.

In order for an organisation to maximise compliance in the workplace, proper appropriate disposal of information has to be made easily accessible for the employee.

Security in Shredding do not recommend placing a recycling bin in close proximity to a printer of copying machine for example as employees can easily discard the unwanted copies or data into the recycling bin. However, Security in Shredding can implement secure lockable consoles throughout the building in specific locations as requested by the organisation and also in close proximity to the copying or printer machines.

If you wish to have a conversation with any of our Data Consultant Specialists, you can pick up the phone and dial +67 24848 or email us at

Hard Drive Must Be Destroyed To Ensure Data Destruction

harddrive destruction, Media Destruction, Confidential Shredding Service

All digital data is stored on a hard drive. Weather its stored locally (your own device) or on a cloud server, the data is stored on a hard drive. The device used to access this data be it a computer, laptop or tablet technology will become outdated or slow to use. When the time comes you may wish to get rid or sell the outdated device.

This is where the data risk lies. Before you sell the device you might have deleted all your local data from the device or even formatted the drive. This does not remove the data from the drive.

The fact is there are software programs designed to help thieves extract data even after data has been electronically destroyed.

At the same time, there are other concerns that make secure e-media and hard drive disposal a critical aspect of device security.

Current Storage Drive Trends:

Affordable.  Hard-drives and storage devices in desktop computers, laptops, servers, phones, USB thumb drives, printers, copiers, and other equipment have become widey available and affordable. In 2015, technology companies shipped more than 2.6 billion devices containing hard drives, according to IT research firm Gartner.

Internet of Things (IoT).  Digital data storage and usage is increasing in businesses and organisations. This increased usage means that more and more devices are connected to a network and can increase the risk of data breaches within a network. Protecting against these potential as data breaches are increasing.

Upgrading.  Electronics become obsolete (and are replaced) within three or four years – and that affects BYOD security and other safeguards. We live in a world where the number of mobile devices exceed the number of people in the world. When upgrading ensure that the older device is destroyed or the data storage device is destroyed.

Cybercrime.  Industry experts predict a continued boom in cybercrime. In America the terms of cost, the average consolidated total cost of a data breach rose 23% to $3.8 million in 2014 compared to the previous year. The 2015 Cost of Data Breach Study: Global Analysis from Ponemon also showed that the average global cost for each lost or stolen confidential record increased from a consolidated average of $145 to $154.

If it can happen in America it can happen anywhere else. Most of the applications you use will be developed globally and the breaches

Responsibility.  Data Protection is a corporate priority and responsibility. The Data Protection Commissioner is set up to ensure that businesses and organisations are protecting data correctly. The DPC also provides guideline on how to protect your business data from breaches. Guidelines can be read here:

Secure document shredding and media destruction companies will provide secure method of data destruction. For more information please visit our site.


6 Steps To Improve Your Data Security


Data is King. Protecting your data comes in many forms. Your confidential document shredding specialist will securely destroy any sensitive documents. Data protection is equally important as data destruction. IBM are a leading High Tech company and provide you with relevant information and software to improve your security.

IBM Security solutions for data security and privacy provide a holistic approach that helps prevent data loss while enabling data access to support business operations, growth and innovation. These solutions help you ensure regulatory compliance, defend against internal and external attacks, and can lower storage and data management costs.

IBM Security solutions for data security and privacy enable a layered approach to achieving data security that helps you:

IBM also provide a free software for you to assess and detect vulnerabilities. The software will detect weak passwords, any misconfiguration on your database. Read more about it here:  

While IBM methods deal with digital data the crossovers and similarities can be applied to your paper data. Paper shredding services will also offer digital data protection and knowledge. Knowing these risks and implementing the steps to prevent a data breach will benefit your business or organisation in the long run.

Technology terminology can be confusing to understand but implementing security measures for digital devices is pretty straight forward. For more information on a data protection and security please contact us or visit our site for more information.

Data Protection With Workplace Technologies

Digital Data & Paper data equally important to protect

Your confidential document destruction service is more than just paper data destruction. Digital data also has a secure data destruction method. The devices used to view this data must be properly protected to ensure your data is protected.

Mobile technology increases workplace productivity. Smart phones, laptops, i-pads and other devices allow employees to work regardless of location. As good as these mobile devices are they also increase the risk of a potential data breach too.

So how does an organisation maintain the increase in productivity whilst protecting its confidential information?

Embrace it; The use of mobile devices assists the employees in their efficiency and productivity.

Latest Technologies; By keeping your technologies up-to-date you are ensuring that productivity is not being hindered by the use of out-dated technologies.

CYOD Policy. For improved security control, a Choose Your Own Device (CYOD) policy is recommended. This allows employees to choose devices from a list of approved choices, and companies could equip devices with the appropriate security.

Control of the apps. While apps can improve both the efficiency and speed of specific work tasks; Security in Shredding encourages organizations to provide employees with practical and approved enterprise-grade mobile apps for work.

Digitize. In todays world there is a growing number of organisations whom are digitizing information and processes to reduce costs. But all sensitive data still has to be properly disposed of when it is no longer required. Security in Shredding strongly recommend organisations to out-source the destruction of data when it reaches end of life. A certified data destruction service provider will securely destroy sensitive material when it reaches its end of life. Proper certified destruction guarantees that data cannot be recovered.

Cloud computing. While cloud benefits include cost savings, elasticity, and storage on demand, it still poses a great concern. There are a number of tools available to protect data in the cloud such as encryption and cryptographic tools. Click here to read more:

Train your employees. All the technologies in the world could be at ones finger tips but the users, in this case the employees need to be taught the best practises. All policies should also apply and be treated of equal importance in the office and outside of the office.

If you require any further information regarding any of the points above, you can get in contact with our Data Management Consultants either through the contact us page or simply phoning us on +35367 24848.

5 Data Security Tips To Protect A Company’s Sensitive Data

Secure Paper Shredding Hard Drive Shredding WEEE Destruction

For many small business owners, are aware of the potential data breaches that can occur. Secure document shredding is one method of data security but most people will think “It wont happen to me” and when it does happen it can cost the business upwards of €100,000 fine if data security was inadequate. For a small business, one data breach can destroy their reputation and customer confidence.

Below are 5 tips to implement data protection solutions that all small businesses can do today to protect their customers, their reputation and their people against data breaches:

  1. Implement a Clear-out Shredding Policy

Clear-out Shredding policies ensure all paper documents are shredded before being recycled or disposed. The Clear-out Shredding Policy removes any uncertainty around whether documents are confidential and require shedding. This simple step is one of the easiest ways to avoid human error including mishandling of confidential documents and files. In addition, all shredded paper is recycled, adding an environmental benefit to a security solution for businesses. Overall, it leaves little to be decided around the type of information that should not be deposited in recycling bins and waste paper baskets.

  1. Encrypt all electronic devices

Mobile devices are everywhere. There are more mobile devices than people in circulation. A workplace mobile will be used so employees can access the information they need remotely, which means company information may be exposed to greater security vulnerabilities. Encrypting all electronic devices is an important first step in securing information.

All electronic devices used by employees should be encrypted to protect sensitive data regardless for their own benefit and not just the company or organisation. In the event that electronic devices are lost or stolen, encryption will protect the information stored on the device and mitigate any compromising activity.

End to end encryption” is a term you should look out for especially when transferring data. Software applications can do the same function a number of different ways. Knowing how they operate is recommended.

  1. Maintain Clean-desk policy

A clean-desk policy encourages employees to clear their desk and secure documents in a filing cabinet or storage unit when they are away from their desk or office at the end of the day. This includes documents, files, notes, invoices, and removable digital media like memory sticks. Unattended and untidy work stations pose a greater risk as loose information is an easy target for theft. A clean-desk policy ensures that all confidential data is locked in a secure area.

  1. Protect Printers & Peripheral Devices

Implement a ‘best practices’ standard for printing confidential information. Encourage employees and staff to not leave documents unattended at a shared printing station. To strengthen security around printing stations, consider using passwords for printing jobs. A printer is connected to a network and can be an entry point for hackers to access a network. Any other peripheral device that’s connected to a network may need an added layer of security just in case.

  1. Designate a Security Manager

If your business or organisation does not have one, now is the time to assign someone to do it. While it is important to have senior management and leadership play a vital role in mitigating data breaches, engaging employees from all levels and cross-departments helps strengthen an organization’s focus and commitment on information security.

At Security In Shredding maintaining data security is a vital importance to us. We must comply with data protection laws. For more information on paper shredding and data destruction services, please get in touch with one of our staff for more information.