THE SINGLE BEST STRATEGY TO USE FOR SECURE AND CERTIFIED DATA DESTRUCTION