(707) 268-8850    Get SUPPORT

Network Management Services Blog

Network Management Services has been serving the Eureka area since 1995, providing IT Support including technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at Network Management Services. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at (707) 268-8850.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 20 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Network Security Best Practices Business Computing Privacy Managed IT Services Hackers Backup VoIP Malware Data Backup Hosted Solutions Email Google IT Support Outsourced IT Software Mobile Devices Internet Microsoft Saving Money Cloud Computing Data Recovery Innovation Business Continuity Ransomware Cybercrime Efficiency Data Small Business Business Cybersecurity IT Services BDR Hardware Communications Disaster Recovery Android Internet of Things Managed IT Server How To Computers Communication Avoiding Downtime Smartphones Alert Smartphone Browser User Tips Business Intelligence Windows Managed IT Services Collaboration BYOD Social Engineering Mobile Device Management Two-factor Authentication Mobility Tech Term Data Protection Data Security Business Management Artificial Intelligence Law Enforcement Vulnerability Chrome Phishing Operating System Bandwidth Passwords Money Windows 10 Compliance Remote Monitoring Identity Theft Firewall Spam Flexibility Network Productivity VPN Proactive IT Telephone Systems Budget Gadgets Redundancy Private Cloud Virtualization Save Money Social Media Mobile Device Update Windows 10 Data Breach App Data Storage Wi-Fi Computer Spam Blocking Value Managed Service Provider Information Technology Automation Holiday CES Router OneNote Quick Tips IT Management Office 365 Workers Data storage IT Plan Credit Cards Word Unsupported Software Content Filtering Solid State Drive Infrastructure Hacking Business Owner Apps Physical Security Bring Your Own Device Productivity Government Document Management Data loss Big Data Smart Tech Comparison Google Drive Employer-Employee Relationship Work/Life Balance Miscellaneous Upgrade Public Cloud Office Tips Human Resources Recycling Settings Computer Care Cast Practices Millennials Hybrid Cloud Frequently Asked Questions Scam Skype iPhone Computer Fan Storage Wireless Charging webinar Staff eWaste History Samsung Hosted Computing Black Market Workforce PDF Excel Start Menu FENG Cortana Fiber-Optic Password Conferencing Wireless Technology Digital Signature Criminal Google Docs IBM Inventory Telecommuting Networking Tip of the week Office IT Support Mobile Hacker Addiction Marketing Cables Encryption Windows 10s Voice over Internet Protocol User Error Data Warehousing Microsoft Office Access Control Remote Work Supercomputer Windows Server 2008 Relocation Professional Services Health Unified Communications Website Strategy Content Management Multi-Factor Security SaaS Hosted Solution Authentication Applications Windows 7 Humor HaaS Tools Files Training Risk Management Theft Analysis Blockchain Trending Internet Exlporer Reputation Hard Drives Nanotechnology Current Events Regulations Downtime Monitor Google Apps Accountants Lifestyle End of Support Customer Connectivity Fraud Knowledge Servers Emails Botnet Charger Root Cause Analysis HIPAA Mobile Computing Internet exploMicrosoft Software Tips Electronic Medical Records Devices Amazon Network Congestion Flash Travel Meetings Safety Password Manager The Internet of Things IoT Advertising Hiring/Firing Data Management Thought Leadership Amazon Web Services IT Consultant Legal Colocation Unified Threat Management Keyboard Business Mangement Recovery HBO Emergency Streaming Media Save Time Online Shopping Facebook Leadership Sync Gmail Netflix Software as a Service Computing Infrastructure Cleaning Screen Mirroring Insurance Specifications Outlook Patch Management Telephony Apple Audit Content Filter Evernote Administration Music Wireless Search Bluetooth Audiobook Presentation WiFi Wearable Technology Transportation Entertainment Twitter Video Games USB 5G Battery Benefits Worker Techology Remote Computing Loyalty Troubleshooting Smart Technology Customer Relationship Management Education Rootkit IP Address Cache Scalability Customer Service CrashOverride Mobile Office Wireless Internet Domains Two Factor Authentication Virtual Reality Vendor Management Politics Public Speaking Workplace Tips Assessment Worker Commute Lithium-ion battery Instant Messaging Television Books Augmented Reality Automobile Tech Support Webinar How to Public Computer IT solutions Competition Fun Employer Employee Relationship Users Best Practice Experience Shadow IT Computer Accessories Content

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *