(707) 268-8850    Get SUPPORT

Network Management Services Blog

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at Network Management Services. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at (707) 268-8850.

Perpetrators of Three Major Cyber Crimes Have Pled...
Tip of the Week: Filters and Labels Help Organize ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, August 19 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Privacy Business Computing Managed IT Services Malware Hackers Data Backup Backup VoIP Google Hosted Solutions Email Data Recovery Outsourced IT Innovation Mobile Devices Tech Term IT Support Microsoft Data Software Cloud Computing Efficiency Internet of Things Communications BDR Saving Money Hardware Business Continuity Internet Cybercrime Small Business Ransomware Business IT Services Cybersecurity Disaster Recovery Android User Tips Smartphones Communication Managed IT Network Managed IT Services Server Computers Gadgets Browser Alert Smartphone Artificial Intelligence Windows How To Avoiding Downtime Save Money Business Management Data Security Data Protection Passwords Productivity Mobility Vulnerability Chrome Money Phishing Collaboration Miscellaneous Router Social Media Law Enforcement BYOD Social Engineering Mobile Device Management Business Intelligence Two-factor Authentication IT Support Computer Operating System Virtualization Windows 10 Flexibility Redundancy Telephone Systems Compliance Budget VPN Identity Theft Firewall Blockchain Office 365 Managed Service Provider Word Document Management Upgrade Private Cloud Productivity Bandwidth Spam Facebook Applications Connectivity Remote Monitoring Proactive IT Office Tips File Sharing Data storage Bring Your Own Device Mobile Device CES Apps Data loss App OneNote Solid State Drive Comparison Hacking Content Management Paperless Office IT Management Microsoft Office Holiday Access Control Workers Password Smart Tech Windows 7 Business Owner Big Data Physical Security Information Technology Website IT Plan Automation Data Breach Update Government Credit Cards Work/Life Balance Analysis Content Filtering Google Drive Unsupported Software Data Storage Servers Infrastructure Windows 10 Quick Tips Public Cloud Employer-Employee Relationship Value Networking Wi-Fi Spam Blocking Information Password Manager Meetings Travel Tip of the week Telecommuting Mobile Hybrid Cloud IT Consultant Digital Signature Machine Learning Augmented Reality Enterprise Content Management Cables HIPAA Devices Customer End of Support Supercomputer Smart Office Wireless Technology Data Warehousing Voice over Internet Protocol Hard Drives iPhone Unified Threat Management Amazon Web Services Entertainment Inventory Windows 10s Managed Service Workplace Tips Business Mangement USB Addiction Safety IoT IBM Windows Server 2008 Remote Work Business Technology Monitor History Emergency Marketing Hacker Professional Services Leadership Encryption YouTube The Internet of Things HBO Password Management SaaS Unified Communications Thought Leadership Internet exploMicrosoft PDF Black Market Multi-Factor Security Cleaning Netflix Online Shopping Sync Gmail Cache Screen Mirroring Software as a Service Training Data Management Virtual Assistant Patch Management CrashOverride Tools Office Strategy Outlook Specifications NIST Cortana Theft Keyboard Streaming Media Advertising Current Events Students Trending Computer Care Settings Evernote Authentication Audit Telephony Scam Recycling Hosted Solution Wireless Internet Cast Insurance Regulations Telephone System User Error Content Filter Downtime Relocation webinar Frequently Asked Questions Millennials Cryptocurrency Colocation Google Apps Knowledge Education Human Resources Healthcare Lifestyle Hiring/Firing Health Samsung Legal Wireless Charging Risk Management Nanotechnology Computer Fan Skype Recovery eWaste Wire Charger Emails Fraud Practices Storage Root Cause Analysis Botnet Humor Conferencing Save Time Accountants Excel Workforce Safe Mode Computing Infrastructure MSP Electronic Medical Records Network Congestion Staff Electronic Health Records Software Tips Mobile Computing HVAC Files Fiber-Optic FENG Start Menu Internet Exlporer Criminal Sports Google Docs Apple HaaS Amazon Hosted Computing Flash Reputation Wearable Technology Twitter Lithium-ion battery Worker Administration Public Computer Remote Worker Virtual Reality Loyalty Smart Technology 5G IT solutions Tech Support Search Rootkit Automobile Wiring Employer Employee Relationship Worker Commute Proactive Instant Messaging Troubleshooting Competition Customer Relationship Management IP Address Computer Accessories Company Culture Video Games Remote Monitoring and Maintenance Two Factor Authentication Battery Users How to Vendor Management Techology Customer Service Mobile Office Bluetooth Managing Stress Assessment Remote Computing Experience Line of Business Domains Transportation Wireless WiFi Content Regulation Music Fun Books Television Scalability Public Speaking Best Practice Politics Benefits Shadow IT Presentation Webinar Audiobook