HOW TO INCORPORATE DATA DESTRUCTION TECHNIQUES RIGHT INTO YOUR CYBER SECURITY TECHNIQUE