{"id":1401,"date":"2018-03-18T04:39:24","date_gmt":"2018-03-18T11:39:24","guid":{"rendered":"https:\/\/wisetekusa.com\/uncategorised\/it-asset-disposition-data-security\/"},"modified":"2019-07-16T09:06:26","modified_gmt":"2019-07-16T16:06:26","slug":"it-asset-disposition-data-security","status":"publish","type":"post","link":"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/","title":{"rendered":"IT Asset Disposition & Data Security"},"content":{"rendered":"

Confidential data is being produced at rapid levels. Photos, videos, email, and social media sites are just some examples of this data. Technological advancements have made it easier to store, access and transfer vast amounts of information and the amount of data that is created each day presents tremendous opportunities for businesses to perform analysis and use the information to grow their business. This amount of data provides endless opportunities but also presents dangerous opportunities for data thieves.<\/p>\n

This means the need for data security to be protected from the first collection point until the time it is destroyed has never been more critical for organizations.<\/p>\n","protected":false},"excerpt":{"rendered":"

Confidential data is being produced at rapid levels. Photos, videos, email, and social media sites are just some examples of this data. Technological advancements have made it easier to store, access and transfer vast amounts of information and the amount of data that is created each day presents tremendous opportunities for businesses to perform analysis […]<\/p>\n","protected":false},"author":1,"featured_media":1403,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[],"acf":[],"yoast_head":"\nIT Asset Disposition & Data Security - Wisetek USA<\/title>\n<meta name=\"description\" content=\"Confidential data is being produced at rapid levels. Photos, videos, email, and social media sites are just some examples of this data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Asset Disposition & Data Security - Wisetek USA\" \/>\n<meta property=\"og:description\" content=\"Confidential data is being produced at rapid levels. Photos, videos, email, and social media sites are just some examples of this data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Wisetek USA\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-18T11:39:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-07-16T16:06:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wisetekusa.com\/wp-content\/uploads\/sites\/3\/2019\/07\/ITAD-process.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"granitewordpress\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"granitewordpress\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/\",\"url\":\"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/\",\"name\":\"IT Asset Disposition & Data Security - Wisetek USA\",\"isPartOf\":{\"@id\":\"https:\/\/wisetekusa.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wisetekusa.com\/wp-content\/uploads\/sites\/3\/2019\/07\/ITAD-process.png\",\"datePublished\":\"2018-03-18T11:39:24+00:00\",\"dateModified\":\"2019-07-16T16:06:26+00:00\",\"author\":{\"@id\":\"https:\/\/wisetekusa.com\/#\/schema\/person\/85cd665cdf20b687534b6bde77a04b82\"},\"description\":\"Confidential data is being produced at rapid levels. Photos, videos, email, and social media sites are just some examples of this data.\",\"breadcrumb\":{\"@id\":\"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/#primaryimage\",\"url\":\"https:\/\/wisetekusa.com\/wp-content\/uploads\/sites\/3\/2019\/07\/ITAD-process.png\",\"contentUrl\":\"https:\/\/wisetekusa.com\/wp-content\/uploads\/sites\/3\/2019\/07\/ITAD-process.png\",\"width\":1024,\"height\":512,\"caption\":\"itad process\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wisetekusa.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Asset Disposition & Data Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wisetekusa.com\/#website\",\"url\":\"https:\/\/wisetekusa.com\/\",\"name\":\"Wisetek USA\",\"description\":\"Leaders in Asset Disposal, Reuse & Data Destruction Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wisetekusa.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/wisetekusa.com\/#\/schema\/person\/85cd665cdf20b687534b6bde77a04b82\",\"name\":\"granitewordpress\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wisetekusa.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/160f781f05bbd080fa1f30e447354805?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/160f781f05bbd080fa1f30e447354805?s=96&d=mm&r=g\",\"caption\":\"granitewordpress\"},\"url\":\"https:\/\/wisetekusa.com\/author\/granitewordpress\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Asset Disposition & Data Security - Wisetek USA","description":"Confidential data is being produced at rapid levels. Photos, videos, email, and social media sites are just some examples of this data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/","og_locale":"en_US","og_type":"article","og_title":"IT Asset Disposition & Data Security - Wisetek USA","og_description":"Confidential data is being produced at rapid levels. Photos, videos, email, and social media sites are just some examples of this data.","og_url":"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/","og_site_name":"Wisetek USA","article_published_time":"2018-03-18T11:39:24+00:00","article_modified_time":"2019-07-16T16:06:26+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/wisetekusa.com\/wp-content\/uploads\/sites\/3\/2019\/07\/ITAD-process.png","type":"image\/png"}],"author":"granitewordpress","twitter_card":"summary_large_image","twitter_misc":{"Written by":"granitewordpress","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/","url":"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/","name":"IT Asset Disposition & Data Security - Wisetek USA","isPartOf":{"@id":"https:\/\/wisetekusa.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/#primaryimage"},"image":{"@id":"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/wisetekusa.com\/wp-content\/uploads\/sites\/3\/2019\/07\/ITAD-process.png","datePublished":"2018-03-18T11:39:24+00:00","dateModified":"2019-07-16T16:06:26+00:00","author":{"@id":"https:\/\/wisetekusa.com\/#\/schema\/person\/85cd665cdf20b687534b6bde77a04b82"},"description":"Confidential data is being produced at rapid levels. Photos, videos, email, and social media sites are just some examples of this data.","breadcrumb":{"@id":"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/#primaryimage","url":"https:\/\/wisetekusa.com\/wp-content\/uploads\/sites\/3\/2019\/07\/ITAD-process.png","contentUrl":"https:\/\/wisetekusa.com\/wp-content\/uploads\/sites\/3\/2019\/07\/ITAD-process.png","width":1024,"height":512,"caption":"itad process"},{"@type":"BreadcrumbList","@id":"https:\/\/wisetekusa.com\/blog\/it-asset-disposition-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wisetekusa.com\/"},{"@type":"ListItem","position":2,"name":"IT Asset Disposition & Data Security"}]},{"@type":"WebSite","@id":"https:\/\/wisetekusa.com\/#website","url":"https:\/\/wisetekusa.com\/","name":"Wisetek USA","description":"Leaders in Asset Disposal, Reuse & Data Destruction Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wisetekusa.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/wisetekusa.com\/#\/schema\/person\/85cd665cdf20b687534b6bde77a04b82","name":"granitewordpress","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wisetekusa.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/160f781f05bbd080fa1f30e447354805?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/160f781f05bbd080fa1f30e447354805?s=96&d=mm&r=g","caption":"granitewordpress"},"url":"https:\/\/wisetekusa.com\/author\/granitewordpress\/"}]}},"_links":{"self":[{"href":"https:\/\/wisetekusa.com\/wp-json\/wp\/v2\/posts\/1401"}],"collection":[{"href":"https:\/\/wisetekusa.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wisetekusa.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wisetekusa.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wisetekusa.com\/wp-json\/wp\/v2\/comments?post=1401"}],"version-history":[{"count":0,"href":"https:\/\/wisetekusa.com\/wp-json\/wp\/v2\/posts\/1401\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wisetekusa.com\/wp-json\/wp\/v2\/media\/1403"}],"wp:attachment":[{"href":"https:\/\/wisetekusa.com\/wp-json\/wp\/v2\/media?parent=1401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wisetekusa.com\/wp-json\/wp\/v2\/categories?post=1401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wisetekusa.com\/wp-json\/wp\/v2\/tags?post=1401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}