In today's world, data security is more important than ever.
That's why DMD uses a wide range of physical and IT safeguards and systems to ensure the integrity of sensitive information.
The first thing you notice about Direct Market Designs’ mail facility is that it’s impossible to get into without a prior appointment and without corporate authorized access. Every single entrance is secure and requires card access.
Look closer and you'll see digital surveillance cameras everywhere - more than 50 of them, both inside and out. Every window is covered by motion sensors.
The server room is protected by concrete & rebar reinforced walls. Our networks and servers have advanced electronic protection, and when your files aren't in use they're stored in a fireproof vault that meets or exceeds every security standard for GLBA & HIPAA compliancy. Your client data is in professional hands.
In 2006, there were in excess of 315 publicized breaches affecting nearly 20 million individuals. Based on ITRC’s categorization, the breaches break down as follows: 29% government/military agencies; 28% from educational institutions; 22% from general businesses; 13% from health care facilities / companies; and 8% from banking / credit / financial services entities. In 2005, there were 158 incidents affecting more than 64.8 million people.
Identity Theft Resource Center (ITRC) is, a nonprofit, nationally respected organization dedicated exclusively to the understanding and prevention of identity theft. The ITRC advises businesses , governmental agencies, legislators, & law enforcement, and about the evolving and growing problem of identity theft.
Identity Theft Resource Center’s Breach List for 2007: There have been 109 data breaches reported for the period ending May 7, 2007, according to the Identity Theft Resource Center (ITRC). The ITRC Breach Reports track these breaches, and also provides statistics on the types and origin.
Security breaches can be broken down into a number of categories. What they have in common is that they contained personal identifying information in a format easily read by thieves, in other words, not encrypted.
- Lost or stolen laptops, computers or other computer storage devices.
- Backup tapes lost in transit because they were not sent either electronically or with a human escort.
- Hackers breaking into systems.
- Employees stealing information or allowing access to information.
- Information bought by a fake business.
- Poor business practices- for example sending postcards with Social Security numbers on them.
- Internal security failures.
- Viruses, Trojan Horses and computer security loopholes.
- Info tossed into dumpsters- improper disposition of information.