Guard Well Appoints New Chief Technology Officer and VP of Operations

Guard Well Appoints New Chief Technology Officer and VP of Operations

Bradley Amster

CINCINNATI, OH – September 1, 2022 Guard Well Identity Theft Solutions today announced the appointment of Bradley Amster, Owner of Data Design Systems, as Chief Technology Officer and Vice President of Operations.

Amster holds a Bachelor of Business Administration in Marketing/Management from the University of Cincinnati. Since 2011, Amster has provided web design and in-depth IT knowledge and solutions for the Cincinnati-based company. Guard Well’s Founder and President remarked, “We are pleased to appoint Brad as a new director. He’s been a large part of our eleven year growth and we are very happy to bring him in house. We are confident that he will continue to provide valuable perspectives as we grow into larger markets and develop new technologies.”

For over a decade, Guard Well has provided award-winning identity theft protection support and complete resolution services after having built a strong partnership with industry powerhouse Experian. Distributed largely through the employee voluntary benefit space, Guard Well’s mission is to provide affordable, yet effective, multi-layered protection for every American household with 24/7/365 protection. Guard Well’s core belief is full resolution for the Member and their household including unlimited access to best-in-class fraud resolution specialists.

Fraud Trend Alert: End-of-life IT Gear

Fraud Trend Alert: End-of-life IT Gear

There is a new fraud trend we are seeing that almost victimized a client of ours who is a very large, well-known employer in the Cincinnati, Ohio tri-state region. We highly suggest that you share this blog to your company IT contact or a company team member whose duties include data security – IT security – technology security and/or IT gear and infrastructure protection.

 

One of our Guard Well product offerings is Enterprise Data Risk Mitigation. It is a program we developed to help organizations by purchasing their end-of-life IT gear, wipe and certify the drives … at no cost … then repurpose the gear. Essentially we turn a data risk and pending expense into a liability shift and a profit. It’s a very effective … and popular program.

 

Last week we were preparing to pull a large lot of gear from one of our clients when two individuals, claiming to be hired by a third party, showed up on the campus insisting they needed to pick up any used IT gear for “processing.” Luckily our client sensed something was incorrect and reached out to Guard Well asking us if we had sent two men to pick up the gear. We informed them that we did not send these individuals and by the time our phone call ended both men had left the campus.

 

What these men were attempting to do is steal the IT gear, most likely to harvest the sensitive company data and sell it to hackers or hold it for ransom until the company paid them to return the data. Due to the large security concerns, we highly suggest that your organization verifies steps taken to protect the sensitive data stored in end-of-life IT gear. Guard Well will partner with any organization looking for a safe, reliable way to manage the proper decommissioning of this gear and turn a profit from its remaining, but depreciating, value.

 

We can work anywhere in the USA, so please let us know how we can help. Be vigilant. Be strong. If you have any concerns or think you have been a victim of fraud, please contact our Member Services immediately so we can fully resolve the issue for you. We are always available 24/7/365 at 888.966.GUARD (4827).

 

Photo credit: Malachi Brooks via unsplash.com

Guard Well Awarded Most Promising Solution Provider – 2020

Guard Well Awarded Most Promising Solution Provider – 2020

Enterprise Security Magazine has once again recognized Guard Well Identity Theft Solutions in their CIOReview as one of the most promising Identity Governance and Administration Solution Providers. The magazine previously featured Guard Well’s Founder and CEO in their article Protecting Your Employees and Company Bottom Line.

 

Most firms have a considerable stockpile of end-of-life IT assets that are loaded with sensitive data and are quickly depreciating. The latest article in CIOReview, Guard Well Identity Theft Solutions: Shifting a Liability and Expense Into Profit, explains how companies are reaping the rewards from trusting the Guard Well data risk mitigation process.

 

Located in Cincinnati, OH, Guard Well has disrupted the enterprise data risk mitigation space with a new solution that wipes and certifies IT hard drives at no fee, repurposes the gear (which is the greenest solution available), and then shares the profit with the client. Guard Well partners only with organizations that use data eradication software endorsed by the Department of Defense (DoD) and which are HIPAA and FDIC compliant.

 

The CIOReview states, “Having achieved a resounding success in the months prior to the outbreak of COVID-19, Guard Well looks poised to create many more success stories in the area of enterprise risk mitigation.” To learn more, visit https://guardwellid.com/enterprise-data-risk-mitigation/.

 

Guard Well is available 24/7/365 at 888.966.GUARD (4827) or via email to [email protected].

Turning Your IT Boneyard into a Profit Center

Turning Your IT Boneyard into a Profit Center

Like most families and organizations in America, you probably have a pile, or maybe even a storage room or two, full of IT assets that are not being used. They’re at the end of their life. They are holding extremely sensitive data. They’re also depreciating quickly.

 

In ongoing efforts to analyze employer risks, and find effective solutions to mitigate them, Guard Well Identity Theft Solutions has developed a Data Risk Mitigation service. “We have partnered with highly experienced software engineers who have perfected the end-of-life process for data center/IT hardware for over twenty years,” remarked E. Allan Hilsinger, Founder and CEO. What does this mean for you? “You have gear … we have cash! It’s really that simple.” He continued to explain, “We buy a customer’s IT boneyard essentially turning their headache, risk, and expense into a profit center. We ensure total data destruction by using the U.S. Department of Defense endorsed three swipe data eradication process, which can occur on or off-site.”

 

How does this process work? The customer’s IT inventory list is reviewed (and created if needed). Then an estimate to purchase if provided. If the estimate is agreed upon, the proper change of custody paperwork will be executed, gear will be accepted and the company gets to work. After the three swipe data eradication process is complete for each piece of equipment, certificates of complete data eradication for each hard drive are provided. Once wiped, the gear is repurposed and the customer will receive the revenue share previously agreed upon.

 

As with all Guard Well programs, our team continuously strives to keep the process simple, safe, and hassle-free and with minimal effort required by your IT team. We are experts on keeping your asset value at a maximum and while completely eliminating data risk.

 

Interested in learning more? Schedule an appointment with us via the ‘contact us’ form on our website or call us today at 888.966.4827 (GUARD).

 

Photo by Tisteo on Unsplash.com