FINEST PRACTICES FOR DATA DESTRUCTION TO FORTIFY YOUR CYBER SECURITY STRUCTURE