HOW TO INTEGRATE DATA DESTRUCTION TECHNIQUES RIGHT INTO YOUR CYBER SECURITY APPROACH