HOW TO INCORPORATE DATA DESTRUCTION TECHNIQUES INTO YOUR CYBER SECURITY STRATEGY