CRUCIAL CYBER SECURITY PRACTICES FOR EFFECTIVE DATA DESTRUCTION METHODS