HOW TO INTEGRATE DATA DESTRUCTION TECHNIQUES RIGHT INTO YOUR CYBER SECURITY TECHNIQUE