Posted on May 2nd, 2013 No comments
Keeping customer and employee information secure is more than good business. It’s the law.
Legislation concerning privacy is becoming more rigorous and continues to be strictly enforced. Organizations that fail to comply will incur severe penalties.
Shredding all confidential information is the preferred method of document destruction.
Our mobile shredding trucks turn paper and computer hard drives into fine shreds that can’t be reconstructed.
19593 NE 10th Avenue
Miami, FL 33179
Tel: 305-999-9234 / 866-467-4733
Posted on May 1st, 2013 No comments
Miami is known for many things –natural beauty, beautiful people, great weather and South Beach. That aside, it is also the fraud capital, not only in terms of Medicare and Medicaid, but in mortgage fraud, identity theft, and potentially in the area of vendor fraud.
Often I have found that fraud discussions and seminars seem to relate to the aforementioned. I have attended many seminars and no one focuses on what I believe is the most crucial potential for fraud that exists –approved vendors sitting in vendor master files. These are vendors you use every day, many who are legitimate and provide excellent and timely services. However, when I ask financial or supply chain managers about the number of active vendors they have or what they know about their vendors’ potential undisclosed relationships and related conflicts, I typically get the “deer in the headlights” stare or an off the cuff response.
Once a fraudulent vendor gets into the accounts payable system, it is like a Trojan horse or computer virus that upon release could cause havoc. Losses due to misappropriations may cost companies hundreds of thousands if not millions of dollars, not to mention loss of reputation and or career for those executives who allowed this to occur. Even worse, it often occurs in plain sight, no back alley deals or brown paper bag brush bys. Everyone knows the vendor and often uses them as the “ people who come to our aid at all hours of the day or night. They are the go to people that get the job done.”
While they may be a trustworthy loyal vendor, do you really know who they are? Do you know if they have relationships with your other vendors or employees? Do they have related companies? Have you even looked to see if the three bidders (in a three bid process you obtained to protect your company) are related and the bid is rigged? Proper and thorough up-front vetting can be used to detect and prevent these problems.
Accordingly, organizations need a robust, vendor on-boarding process which thoroughly and completely requires vendors to submit to an in-depth review in order to identify potential conflicts with existing employees and management of the organization with whom the vendor is trying to do business.
Pertinent data is entered by the vendor and then is sent out through various public databases; concurrently, information is obtained allowing management to make an intelligent decision regarding whether to engage the vendor.
Not only does this improve internal controls, but also identifies conflicts before a vendor is on-boarded while highlighting other anomaly data and improper relationship issues. In some systems, the vendor pays a fee to do business with the organization; in essence, it is a zero cost proposition to the entity choosing to use it!
Our experience shows what well intentioned and highly educated managers, in an effective if not excellent control environment, can often leave themselves and their organization vulnerable to fraudulent vendors if they don’t know what they don’t know. In this case what you don’t know can really hurt you and your organization!
Vendors beware! Companies know thy vendors…
Posted on December 13th, 2012 No comments
Without employees, businesses would not be able to thrive. Employees are an integral part of any business, company or organization. That is why it is important to protect your employees from identity theft and fraud. As the top shredding company in Florida, MicroShred will protect your employees from identity left. For example, employers should properly destroy payroll information and any materials that involve labor relations or legal affairs.
Hiring MicroShred also takes the burden off employees from doing the actual shredding themselves. Employees can spend time on their actual duties and leave the shredding of important and confidential documents to the professionals. Make your employees aware of your company’s use of shredding services and the importance of protecting themselves against identity theft.
MicroShred’s services are designed for businesses that generate a significant amount of sensitive and confidential documents that need to be destroyed, including employee documents. To ensure security and convenience, MicroShred provides a variety of sizes and types of lockable bins to fit your needs. Once the bins are brought to your business, we will work with you to establish a schedule in regards to how often the bins need to be emptied and documents shredded.
Shredding service visit frequencies are normally set by weeks such as every 1, 2, 4, 6 or 8 weeks. A MicroShred mobile shredding truck will then appear at the client’s site on the pre-scheduled dates to service the bins and completely destroy their paper content by a cross shredding process that can be witnessed by the client.
Everything about MicroShred is professional – from their customer service representatives, to the highly-trained employees in the field. Customers’ security and safety is MicroShred’s top priority. MicroShred is reliable and offers high security services. MicroShred is an AAA certified member of the National Association for Information Destruction (NAID) and an A rating member of the Better Business Bureau.
By protecting your employees from identity theft, you are protecting your business and preparing for the future. MicroShred will take care of all your shredding services so you can continue to concentrate on what is important.
Posted on September 9th, 2008 No comments
Without a program to control it, the daily trash of every business contains information that could be harmful. This information is especially useful to competitors because it contains the details of current activities. Discarded daily records include phone messages, memos, misprinted forms, drafts of bids and drafts of correspondence.
All businesses suffer potential exposure due to the need to discard these incidental business records. The only means of minimizing this exposure is to make sure such information is securely collected and destroyed.