Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Alerts»Dumpster Diving: How to Dispose of Information Properly
    Alerts

    Dumpster Diving: How to Dispose of Information Properly

    By Sofia CoraOctober 27, 20222 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    Have you ever thrown out a piece of paper with your address on it from a package? If so, you should be more careful in disposing of sensitive information in that manner. There is a term known as dumpster diving that malicious people use to obtain information such as that paper you threw away. Dumpster diving describes itself, it is simply someone sifting through your personal or company’s trash trying to find personally identifiable information. Today we’re going to learn how to dispose of your sensitive trash safely so that no one is able to use it against you.

    Disposal Techniques

    • Shredding your papers in a cross shredder or pulper is an easy way to destroy your sensitive papers. It will be harder for a malicious person to try and put the shredded or pulped bits back together again. Have these devices readily available so that it promotes proper destruction techniques.
    • Have a data retention policy that is reviewed yearly. With a data retention policy, you will be able to have guidelines on how long certain information is kept and when it should be properly disposed of. With the data retention policy, you should also keep a log of how something was destroyed, when it was destroyed, and what destroyed it. You can also expand upon it to how your organization will need to use it.
    • When destroying technological devices verify that the data on them was deleted in a proper manner and that old data can no longer be accessed. If throwing out the technological device an extra precautionary step after wiping the old data would be to also destroy the storage media on the device as well.

    If you follow these steps you won’t have to worry about anyone collecting sensitive information through your trash. If you are on the fence about something being sensitive information, then dispose of it properly anyway. It is better to be safer than sorry. Some dumpster divers will spend weeks, months, and years collecting and piecing information together to maliciously gain access to you or your company’s information.

    Source: https://www.techtarget.com/searchsecurity/definition/dumpster-diving#:~:text=Social%20engineering%20is%20using%20human,they%20use%20to%20establish%20trust.

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Alerts Cybersecurity Awareness Month Tip Cybersecurity Month Device Information Security Guides Mobile News and Events
    Previous ArticleShoulder Surfing: Accessing Sensitive Information
    Next Article The WannaCry Ransomware Attack

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d