R4 Services

  • Home
  • Services
    • Document Management >
      • Legal Document Management
      • Banking and Financial Services Document Management
      • Healthcare Industry Document Management
      • Government Document Management
      • Corporate Document Management
    • Paper Shredding Services
    • Office Packing Services
    • Destruction Services
    • Hard Drive Destruction
    • Electronics Recycling
    • Vault Services
    • Document Scanning and Imaging Services
    • Indexing
    • Disaster Recovery
    • Web Access
  • Meet
  • FAQs
  • Contact
  • Blog
  • Store
  • Home
  • Services
    • Document Management >
      • Legal Document Management
      • Banking and Financial Services Document Management
      • Healthcare Industry Document Management
      • Government Document Management
      • Corporate Document Management
    • Paper Shredding Services
    • Office Packing Services
    • Destruction Services
    • Hard Drive Destruction
    • Electronics Recycling
    • Vault Services
    • Document Scanning and Imaging Services
    • Indexing
    • Disaster Recovery
    • Web Access
  • Meet
  • FAQs
  • Contact
  • Blog
  • Store

Solutions for ALL Businesses

3 Steps to Create an Information Security Plan

5/27/2022

0 Comments

 
Increase Information Security
It seems as though every week, we hear about new security breaches. Whether it be an email server, a restaurant, or a larger institution, no one is safe from hackers until it’s too late. No matter the industry or the number of employees within the firm, increasing security is necessary for all businesses. Whether you are planning for future protection or are implementing a plan because of a breach, security and efficiency go hand-in-hand when protecting your business. Below are three ways to create an information security plan and ensure that your business runs efficiently.

1. Use Strong Passwords

The first step in protecting your information is creating strong passwords that are changed often and unique to each platform. Having the same password for every device and login makes you susceptible to hackers because they can access any account they choose once they have your password.

Don't share your passwords with anyone or leave notes around the office with passwords written on them. Doing so only makes it easier for your passwords to fall into the wrong hands. Instead, consider investing in password management software for both business and personal use. Password managers will securely store your passwords and help you create unique and strong passwords that you won’t have to worry about remembering yourself.

2. Protect Sensitive Data with Vault Storage

All businesses have paper. No matter how environmentally friendly organizations try to become, some documents must always be accessible. Storing documents either onsite or offsite should be secure, and only those authorized should have access to them. Protecting classified information, whether it is having a filing cabinet or a document cage,  will protect your business and ensure documents are up-to-date and in order. ​

R4 Service’s document management and vault storage offerings can help protect your business’s critical data and sensitive information. Our state-of-the-art storage facilities have centrally monitored security and surveillance systems to give you peace of mind knowing your important documents, computers, hard drives, and other data are in safe hands.

3. Destroy Old Documents

One of the simplest ways to protect from a breach is to destroy any documents that are not needed. Having an onsite shred location guarantees information will not fall into the wrong hands and is an easy way to implement a recycling program in your office!

If you have large shredding jobs or just need some additional assistance, R4’s shredding services can help. Our shred trucks service the greater Chicagoland area and are equipped to handle any job, big or small, right from your parking lot. Our facility also offers shredding and hard drive destruction services so you can quickly and safely dispose of old sensitive data.

R4 Serivces Is Here to Help Improve Your Business’s Security

Every company should take steps to strengthen its information security. By taking the necessary steps to avoid security breaches, you will decrease the risk of identity theft and hacks and improve your workplace's efficiency. 

Ready to strengthen your business’s security? Contact R4 Services today.
contact us
0 Comments

How to Stop Hackers and Protect Your Business

7/16/2019

0 Comments

 
Picture

Cyber Security Tips to Stop Hackers and Protect Your Business


Business owners understand the importance of keeping their customers’ confidential information secure. Whether it’s credit card information, social security numbers or passwords, hackers are after sensitive customer data. That’s why it’s important for all businesses to take the necessary steps to protect their customers with proper safeguards. Here are three ways to fight off hackers and protect your business (and your customers).
​

Use Different Passwords on Your Accounts
A study that analyzed 10 million passwords revealed that a stunning 17% of people still think it's acceptable to use '123456' as a password. So it's not surprising to hear that when individuals get hacked, it's oftentimes because they were perceived as low-hanging fruit to the hacker. If someone obtains the password to one account, chances are it works for others, so be sure to use randomized passwords with varying cases and keep them different for each account!

Additionally, taking simple steps such as making your social media profiles private can go a long way in protecting your passwords, since they tend to be treasure troves of exploitable information. For instance, social media profile info is used to either guess passwords to access accounts or even just reset them via answering security questions. You know, the ones like, "what's your mother's maiden name?" or, "what's the name of your elementary school?". Info that is often readily available on social profiles. But if the general public can't see this data, then it acts as a passive hacker deterrent.

Educate Employees About Cyber Security
Even though it is quite rare for people to be the sole targets of a data breach, it does happen, oftentimes due to easily-exploited security flaws or simple ignorance about phishing and other scams. An organization is only as strong as their weakest link, when it comes to cyber security. It just takes 1 person to click a shady link or unwittingly give out crucial information in order for a hacker to gain entry to your network. But by educating your team and showing them how phishing scams, ransomware, social engineering, etc. work, you're helping them to stay vigilant and be aware of potential threats. Make it a requirement for everyone in your organization to change their computer passwords and email passwords every few months. Onsite and offsite document shredding and destruction services will also add an added layer of information security to your business.

Most companies and people think a data breach will never happen to them. But this mindset is dangerous and can lead to inaction. Just look at the data breach that happened to Target a few years ago -- they neglected to implement standard security protocol which caused them to miss when the breach actually happened. It's unknown if the incident can be attributed to a 'could-never-happen-to-me' attitude, but the reality is that breaches can happen to anyone at anytime via unexpected means, so it’s critical to have a response plan in place. Do your employees know what to do when a hack occurs? Develop a plan and ensure your entire company is aware of the situation and they’re prepared to take the appropriate action.

Make Technology Work For You
When it comes to document management, fast access and accuracy are crucial. But the security of your documents should be priority number one. To obtain the highest security, invest in technology that will work for you and your business. For example, R4 Services has invested in superior records storage software from VCKweb to manage millions of boxed records and active files for our clients with fastidious accuracy and efficiency. Through our secure online portal, you'll be able to:
  • Perform your own data entry, both at the box and file level
  • Request/retrieve boxes and files
  • Request pickups and returns
  • Create custom searches and queries using the integrated query builder (Boolean logic) and export results in seven different file formats for use at your own PC
  • Process items for destruction
  • Process items for permanent withdrawal
  • Order empty cartons

Your employees are the gatekeepers of your organization’s most important data. That’s why it’s important to train them on best practices in the information security space. Make security a part of your company culture, develop a response plan in the event of a breach and choose the right technology to keep your information safe. By doing so, you’ll avoid hackers and protect your business from being the next victim.
Order Secure Shred Bins
0 Comments

Data Breaches in the US

6/21/2019

0 Comments

 
Picture

2019 Data Breach Statistics in the US

It's no secret that as technology rapidly expands and digitalization takes over, so too do the methods of thieves and hackers. These days it seems like every week we hear about a large organization being hacked and customer data being compromised. But even though the news reports large breaches, smaller ones happen all the time that may not be as widely publicized. Although a large company like Google or Yahoo! can financially withstand the impact of a large-scale hack, it will more greatly affect a small business. It's important to be aware of how common data breaches are and to highlight some statistics to recognize the importance of proper data retention schedules and practicing frequent confidential document destruction. Here are some quick facts:

  • Since 2013, nearly 10 billion data records have been lost or stolen. Only 4% of those were deemed "secure breaches", meaning the stolen data was unusable due to security measures.
  • 2017 was the biggest year in history (thus far) regarding data breaches. More than 7 million records were lost or stolen every day that year.
  • 86% of the world's reported data breaches in 2017 took place in the US.
  • The average cost of a data breach in the US is $7.34 million.

10 Largest Data Breaches in History

  1. Yahoo! (2014): 3 billion user accounts
  2. Adult Friend Finder (2016): 412 million user accounts
  3. eBay (2014): 145 million user accounts compromised
  4. Equifax (2017): 143 million people's social security numbers, driver's licenses, addresses and credit cards were exposed
  5. Heartland Payment Systems (2008): 134 million credit cards exposed
  6. Target (2013): Credit card info and contact info of 110 million customers compromised
  7. TJX Companies (2006): 94 million credit cards stolen
  8. Uber (2016): Personal info of 57 million users and 600,000 drivers exposed
  9. JP Morgan Chase (2014): 76 million households and 7 million small businesses had their personal info stolen
  10. Sony's Playstation Network (2011): 77 million PSN users had their account details stolen/compromised ​
0 Comments

What You Need To Know About GDPR

5/14/2018

0 Comments

 
GDPR R4 Services
The new EU General Data Protection Regulations (GDPR) kick in on May 25. While you may be thinking, "I'm a US business, this won't affect me," you would be wrong. While, indeed, the laws are being passed in the EU, tech companies and global firms are scrambling to reach compliance requirements -- the new laws apply to any company that has customers residing in the EU. You may have recently gotten notification emails from major global players, but it's not just the Googles and Facebooks of the world that need to be aware. You do, too. In fact, it's more beneficial for you to start making adjustments now, if you haven't already -- the hefty fines that come with violating GDPR would be a drop in the bucket to a major firm like Google, but they could easily sink a small business. Here's everything you need to know.

What is GDPR?
GDPR stands for General Data Protection Regulation, a new set of data privacy laws that goes into effect on May 25, 2018 throughout the EU. It aims to allow EU citizens to have more control over their private data by forcing companies to be more transparent about what information they collect, what they do with it and implement data collection consent forms. This means that companies may no longer have vaguely-worded Terms of Service agreements, they must recognize new forms of data, and customers must opt in to allow companies to collect their data.

Whom does it affect?
GDPR affects every business within the EU as well as those that do business in it. So, for example, if your business is located in the US but you have customers in the EU, you must still comply with GDPR for that market. This is why major companies throughout the US and abroad have been double and triple checking that they're ready.

What are some essential things to know?
You can visit the Information Commissioner's Office (ICO) to see a full list of what to expect and how to prepare, but here are some of the major takeaways:

  • Beefing up security is a must since data breaches will be taken much more seriously. Companies that experience a data breach must report it to the ICO within 72 hours.
  • "Personal data" has been redefined to include photos, bank details, social media names and posts, medical information and IP addresses.
  • More detailed descriptions regarding the purpose of data collection must be explained to customers.
  • Customers are now allowed to ask companies for access to their collected data, and companies must comply. Customers are also allowed to tell companies to completely erase all data collected on them.

What are the GDPR penalties?
Punishments are very severe, which is why small businesses must be aware and prepared. Any organization in violation of GDPR laws will be fined $24.6 million OR 4% of their annual global turnover -- whichever is bigger.

The stakes have never been higher when it comes to ensuring data protection compliance. There are sure to be companies caught in the proverbial net, facing penalty during this transition; don't be one of them! R4 Services specializes in data protection and file destruction to ensure compliance. We have a brand-new state-of-the-art hard drive shredder as well as bulk paper shredding services, available both onsite and off, for your business. If you have customers in the EU, it's imperative to comply with the new privacy regulations, so give us a call to securely destroy unnecessary files. Even if you don't have customers in the EU, it's not hard to imagine that similar laws may make their way to the US soon, so get informed!
0 Comments

Preventing Data Breaches

4/23/2018

0 Comments

 
R4 Services Preventing Data Breaches
It seems like we hear about large-scale data breaches in the news on an all-too-frequent basis. Yahoo! had a breach just a few years ago that compromised 3 billion users' accounts, eBay had one around the same time that compromised over 140 million users and the recent Equifax hacking scandal led to millions of people's most sensitive information being stolen and forced resignations from multiple executives. And those are only the large, publicized ones. In fact, there were over 1,500 breaches in the year 2017 alone.

Data breaches are no joke and proper security, risk assessment and retention schedules should be taken seriously. Many businesses rely on their reputation and integrity to keep customers' trust and keep them coming back. One data breach is all it takes to ruin a small business, so it's of utmost importance to ensure that your retention schedule protocol is in place and followed. That's why R4 Services offers confidential, secure document destruction and shredding services. We understand that today's world produces and stores more information than ever before -- whether it's on paper, tape, hard drives, x-rays, film, etc -- which is why our facilities are well-equipped to handle any type of media destruction. We understand the importance of secure document disposal, so we will help you develop and maintain a retention schedule that works best with you and lets you maintain compliant. R4 Services' customized destruction plan includes:
  • Installed locked, tamper-proof containers at your location for disposal of all sensitive materials.
  • Periodic collection of said materials to be shredded and securely transported for disposal. A receipt of items received will be issued at the time of collection.
  • Confidentially shredding the material under the supervision of insured employees.
  • We then bale and ship the destroyed material to be recycled into new, usable products.
  • A Certificate of Destruction upon completion of the destruction process is then issued.

You may be tempted to throw out or store old hard drives, film or paper. But if confidential data gets into the wrong hands it can lead to lost customers and loss of revenue. If you’re not using a secure destruction method, your business is at risk. R4 Services will help you maintain compliance through our state-of-the-art document destruction services. Give us a call today to find out more.
0 Comments

What are the 4 Rs in "R4 Services"?

1/19/2018

0 Comments

 
R4 Destruction Services
Since 1993 we've dedicated ourselves to providing top-quality services in every facet of document management. From organization and storage to digitization and destruction, we work hard to maintain the 4 Rs that hold us to a higher standard than the rest -- but what are they?

Reliable
We mean what we say and we say what we mean. When we plan your document management strategy, we'll follow through every single time. When you store your sensitive materials with us, nobody but you (or people you designate) will access them. If you want to destroy your documents, they'll never be seen again. If you want rush delivery, then start the clock because we'll be there within a few hours. Your information is our priority and we're dedicated to providing top-notch services in a timely fashion.

Resourceful
We are a team of industry experts with extensive knowledge and capabilities. We always implement the latest state-of-the-art technologies to ensure your documents' security, accessibility and integrity. When it comes to planning your document management strategy, we'll provide innovative ways of customizing your solutions to increase your efficiency. We'll work with you to control your costs without sacrificing your business' integrity.

Responsive
Accessibility should be our middle name. We are available at any time -- yes, 24 hours a day, 365 days a year. Our secure online web portal allows you to access your documents remotely at any time. Need a delivery or pick-up? Phone it, fax it, or email it. Take your pick.

Reasonable
We're flexible to all of your needs. We'll work with you to find solutions to improving your business' efficiency any way possible. Our many options will fit any budget. Our flexible programs will meet your needs. And you will be guaranteed customer satisfaction.

These 4 Rs are the foundation that hold up our organization, allowing us to deliver to you efficient, excellent service at reasonable prices. Let us help you -- come see what makes us so effective in a variety of industries
0 Comments

Utilizing Your VCKweb Portal

9/8/2017

0 Comments

 
Picture
Your company’s data organization, accessibility and security are high priority not just for you, but for us. This is why we use Visual Corporate Keeper to organize and secure your data. Once you begin data services with us, we’ll give you personal instruction on proper utilization of your account, but here is a brief overview on what you can expect.
​
Immediate and Mobile Accessibility
After setting up and logging into your account, you’ll find that if you need to access your data from multiple locations, it won’t be an issue. Using a maximum security web browser, you can retrieve your documents using any computer platform with an internet connection. If you’re extra worried about account integrity, you can set up extra security measures like IP Blocking, which only allows access to your data from within your company. You can also limit the days and even times that your data is accessible.

Instant Service
Remotely do data entry on both the box and file level, request and retrieve files, create custom searches, and more. This is all done online and instantaneously through your secured VCKweb account. It’s made as quick and easy as possible so you can run your business more efficiently, concentrating on what matters.

In addition to the above benefits, you’ll have access to an integrated report writer, generating easy and organized reports that can be downloaded and printed immediately. You can even schedule and process document destruction through your account.

R4 Services is dedicated to making your life easier by handling the nitty-gritty and often tedious task of data management, accessibility and destruction. For more information or to schedule our services, get in touch today! ​
0 Comments

Understanding Today’s Digital Age and How to Protect Yourself from Identity Theft

3/2/2017

0 Comments

 
Picture
In today’s digital age, protecting your personal and business information from identity theft is crucial. Today’s technology and digitization of information has made properly disposing of and protecting your confidential information more challenging. But there are ways to protect yourself. Here’s how.

1. Prevent
The first step is to position yourself to prevent identity theft happening in the first place. Shredding documents that you no longer need is a good first step. Records that contain important personal and business information, like bank account information, social security numbers, signatures, and other confidential information, should be securely stored in a professional storage facility.

2. Uncover
When you see a red flag, take action. If you get a call from a creditor that you’re not expecting or a letter about credit on purchases that you didn’t make, there’s a problem. You can detect identity theft by being aware of your financial picture, where your confidential information is stored, and take action when things don’t seem right.

3. Protect
Hopefully you’ve taken the proper steps to prevent identity theft by investing in document destruction or document management services. But if you find yourself in the unfortunate situation of identity theft, immediately contact the company where the fraudulent transaction occurred. Notify them of the situation and ask if they have any process for handling identity theft. There’s a chance you may have to file a police report. Secondly, it’s recommended to complete an Identity Theft Report with the Federal Trade Commission. You can complete the report online or call 877-438-4338.

Technology can streamline and simplify our lives and the way we do business, but it can also add complexity to protecting our important information. Follow these tips to protect your identity, your important business and personal information, and your livelihood.
0 Comments

Safety & Serenity: 2 Reasons to Clear Your Crowded Desk and Achieve Organization Through Business Records Management

11/4/2016

0 Comments

 
Picture
Records management not only helps your overall business, but it can also make an impact on a personal level, right down to your individual desk. Clearing a crowded workspace by implementing a records management plan can provide you with both safety and serenity.

Safety
When your documents are piled up on your desk or strewn about your office, you are opening yourself to several vulnerabilities. First, there is the risk of theft. Valuable records in the wrong hands can lead to identity theft, and you can be accountable for any loss of your client's information or finances.

And it's not just outside visitors you have to worry about, but yourself as well. Documents that are left lying around are more prone to be shuffled about, placed into a wrong folder, or accidentally thrown away.

You likely spend plenty of time and money investing in a backup plan for data on your network. Just because information is on paper instead of in an electronic form doesn't make it any less valuable. So, it's important to remember that when your records are properly organized or stored offsite, you are protecting yet another important business asset.

Serenity
Research proves that a cluttered office can lead to a cluttered mind. When you are working with stacks of papers towering over you, it can create a sense of claustrophobia and disarray, and that's not the best conditions to work in.

But when your records are properly organized and stored at an offsite location, you can walk into your office each morning and be greeted by a clean desk. This can decrease irritability, increase patience, and improve focus.
​

You can also achieve peace of mind by knowing that your records are still available to you at a moment's notice. This combination of clear focus and worry-free state of mind can help you gain more energy, open you up to more creativity, and create a calming atmosphere for you and your team to do your best work.
0 Comments

Data Breaches and Why They're Catastrophic for Small Businesses

10/14/2016

0 Comments

 
Picture
​Cybercriminals do not just focus on large organizations. In fact, 43% of cyber attacks target small business, and the estimated cost for a small business to recover from a data breach averages $36,000. In addition, 60% of small businesses go out of business only after six months after a data breach.  

Here is a look at some of the impacts a data breach can have on a small business.

Regulatory Fines & Legal Fees
When a business suffers a data breach, the regulatory organizations will perform an investigation. If a company is found to not have complied with the regulatory requirements, they will be required to pay extensive fees. Then there is the potential of legal fees should customers bring a lawsuit against the organization.

Recovery Cost
Depending on the type of breach a small business encounters, it may have to replace servers, POS equipment, or anti-virus software. Just the cost of one of these upgrades can impact a small business, but if you have to change multiple items, the cost can be impossible to manage. According to the 2016 Ponemon Cost of Data Breach Study, each lost or stolen record that has sensitive and confidential data costs the business owner $158.
​

Loss of Customer Trust
Then there's the cost that you can't assign a dollar value to – the loss of customer trust. A data breach to a small business can make it appear unsecured and unprofessional. This can make it easy for a customer to choose to take their business elsewhere.
0 Comments
<<Previous

    Archives

    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    July 2021
    May 2021
    April 2021
    February 2021
    October 2020
    June 2020
    March 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    February 2019
    December 2018
    November 2018
    October 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    July 2015

    Categories

    All
    Destruction Services
    Disaster Recovery
    Document Management
    Document Scanning And Imaging Services
    Document Storage
    Electronics Recycling
    Hard Drive Destruction
    Indexing
    R4 Services
    Security
    Shredding Services
    Vault Services

    RSS Feed

Picture
R4 Services LLC
(773) 843-3915 
1301 W 35th St, Chicago, IL 60609
Terms & Conditions | Privacy Policy | © R4 Services LLC
Picture
Website by RyTech, LLC