THE INFLUENCE OF EFFECTIVE DATA DESTRUCTION ON CYBER SECURITY THREAT MONITORING