IDEAL PRACTICES FOR DATA DESTRUCTION TO STRENGTHEN YOUR CYBER SECURITY STRUCTURE