Public and Private Utilities have always been a significant concern as they operate and manage critical resources that, in the wrong hands, could lead to things like food shortages, loss of vital transportation resources, civil unrest, and even potentially the loss of life. The threat to local, state, and federal government, coupled with the emergence of green technologies and "smart" grid infrastructures to better implement and allocate energy to consumers, has caused a shift in thinking from traditional methodologies to more advanced and intentional ones. NERC-CIP (North American Electric Reliability Corporation Critical Infrastructure Protection) has recently transitioned from version 3 to version 5 in their protocol, and with this transition comes more focus on secure, critical infrastructure protection from all threats foreign and domestic.
The country’s nuclear infrastructure requires the most stringent and serious security. In fact, all utilities are integral in the continuation to ‘life-as-we-know-it.’ If control of a dam were to be breached for malicious purposes, millions could be at risk. At the heart of all this, and the very epicenter of securely managing these critical services, is Information Technology. Without secure IT operation, things would look much differently and daily life for millions would be seriously curtailed. Managing this data securely throughout its life-cycle requires strict adherence to all three tiers of the data-security ecosystem. Tier 1 and Tier 2 Data Security protocols coupled with Resource 1’s certified Tier 3 Data Security® at the asset’s useful end-of-life, completes a sustainable data security ecosystem which responsibly manages critical data from cradle to grave.
Resource 1 understands the need for extremely thoughtful information security processes and works with some of the Southeast's largest Manufacturers and Utilities to oversee the safe decommissioning and destruction of confidential data residing on their retired IT devices.