BEST PRACTICES FOR DATA DESTRUCTION TO FORTIFY YOUR CYBER SECURITY STRUCTURE