HOW TO INCORPORATE DATA DESTRUCTION TECHNIQUES RIGHT INTO YOUR CYBER SECURITY STRATEGY