HOW TO INTEGRATE DATA DESTRUCTION TECHNIQUES INTO YOUR CYBER SECURITY TECHNIQUE