(707) 268-8850    Get SUPPORT

Network Management Services Blog

Network Management Services has been serving the Eureka area since 1995, providing IT Support including technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at Network Management Services. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at (707) 268-8850.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 21 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Cloud Technology Business Computing Network Security Best Practices Managed IT Services Privacy Hackers Backup VoIP Malware Google IT Support Data Backup Mobile Devices Email Outsourced IT Innovation Microsoft Software Business Continuity Hosted Solutions Small Business Business Saving Money Efficiency Communications Data Recovery Cloud Computing Hardware Disaster Recovery Ransomware Avoiding Downtime Cybercrime Server How To Cybersecurity Alert Android BDR Smartphones Data Computers Internet of Things User Tips Social Engineering Chrome Internet Communication Mobility Windows IT Services Managed IT Services Two-factor Authentication Managed IT Proactive IT Smartphone Telephone Systems Business Intelligence Money Business Management Budget Gadgets Windows 10 Browser BYOD Social Media Phishing Flexibility Passwords Data Security Artificial Intelligence Collaboration Remote Monitoring Private Cloud Compliance Vulnerability Law Enforcement Firewall Spam Save Money Mobile Device Management Operating System Bring Your Own Device Information Technology CES Employer-Employee Relationship Router Work/Life Balance OneNote Miscellaneous Upgrade IT Management Virtualization Identity Theft Windows 10 Data Breach IT Plan Credit Cards Word Wi-Fi Computer Bandwidth Unsupported Software Solid State Drive Network Spam Blocking Value Hacking Managed Service Provider Business Owner Holiday Physical Security Data Protection Document Management Quick Tips Government Redundancy Office 365 Google Drive Data storage Workers Public Cloud Office Tips Content Filtering Productivity App Data Storage Workforce Network Congestion Excel Black Market Electronic Medical Records Start Menu FENG Password Safety Fiber-Optic Apps Criminal The Internet of Things Google Docs Productivity Hiring/Firing Data Management Office Telecommuting IT Consultant Tip of the week Mobile Unified Threat Management Keyboard Automation Cables User Error Big Data Voice over Internet Protocol Data Warehousing Emergency Relocation Remote Work Leadership Windows Server 2008 Netflix Professional Services Health Unified Communications Content Management Multi-Factor Security Patch Management Humor Windows 7 Settings Tools Computer Care HaaS Files Theft Internet Exlporer Blockchain Reputation Trending Scam webinar Regulations Samsung Downtime Google Apps End of Support Customer Lifestyle Cortana Fraud Conferencing Servers Botnet Human Resources Root Cause Analysis Infrastructure Wireless Technology Internet exploMicrosoft IBM Mobile Computing Networking Software Tips Hacker VPN Amazon Marketing IT Support Flash Windows 10s Travel Staff Meetings Microsoft Office Password Manager Advertising Supercomputer Amazon Web Services SaaS Data loss Legal Hosted Solution Colocation Business Mangement Website Comparison HBO Recovery Save Time Training Facebook Risk Management Online Shopping Sync Software as a Service Screen Mirroring Computing Infrastructure Gmail Hard Drives Specifications Current Events Outlook Audit Monitor Apple Evernote Telephony Update Cast Mobile Device Recycling Hybrid Cloud Millennials Knowledge Frequently Asked Questions Charger Computer Fan HIPAA iPhone Wireless Charging Emails Skype eWaste History PDF Automobile Tech Support Webinar Public Computer Video Games Battery IT solutions Techology Competition Remote Computing Fun Education Employer Employee Relationship Users Cleaning Experience Scalability Applications Computer Accessories Content CrashOverride Music Wireless Search Virtual Reality Bluetooth Audiobook Wearable Technology Presentation Workplace Tips Transportation Worker Commute Entertainment USB 5G Instant Messaging Benefits Worker Loyalty Troubleshooting Customer Relationship Management How to Smart Technology Rootkit IP Address Digital Signature Customer Service Mobile Office Domains Best Practice Shadow IT Two Factor Authentication Vendor Management Politics Public Speaking Assessment Administration Lithium-ion battery WiFi Television Books Augmented Reality

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *