Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at Infracore LLC. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at (858) 509-1970.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 26 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Technology Best Practices Cloud Business computing Google Software Network Security Microsoft Malware Hackers Internet Windows 10 Backup Android Business Email Smartphones Alert Data Small Business Business Continuity Innovation Managed IT Services Hosted Solutions Hardware Browser VoIP Ransomware Office Business Management Computers Disaster Recovery Smartphone Computer Productivity Law Enforcement Outsourced IT User Tips Cybercrime Efficiency Cloud Computing How To IT Services Telephone Systems Chrome Mobile Devices Tech Term Communications Data Backup Productivity Collaboration Cybersecurity Virtualization Work/Life Balance Quick Tips Artificial Intelligence Money Social Engineering Miscellaneous Router App Passwords Health Communication Managed IT Services Windows Password Social Media Apps Windows 10 Google Drive HaaS Bring Your Own Device IT Support Phishing Internet of Things Office 365 Data Breach Facebook Vulnerability Spam Two-factor Authentication Network Automation Saving Money Office Tips Mobile Device Management Upgrade Hacking Holiday Data Recovery Wi-Fi Data Security Data Protection Private Cloud Big Data Gadgets Business Intelligence Public Cloud Update Marketing Data Storage Battery Electronic Medical Records Server OneNote IT Management Employer-Employee Relationship Spam Blocking VPN Microsoft Office History IT Plan Operating System Legal Flexibility Word Keyboard PDF Charger Website Patch Management Unsupported Software Applications CES Mobility Cleaning Managed IT Managed Service Provider Scam Mobile Device Samsung Computer Care Bandwidth BYOD Value Identity Theft Infrastructure Redundancy End of Support Remote Computing Avoiding Downtime Comparison Automobile Remote Monitoring Data Management Workplace Tips Government Worker Recovery Cast IT Consultant Recycling Settings Digital Signature Techology Outlook Skype Politics Instant Messaging Smart Tech Television Online Shopping Rootkit Books Leadership eWaste Encryption Millennials Frequently Asked Questions Files Start Menu Hybrid Cloud Connectivity Public Computer Evernote Training Education Criminal Workforce Save Money Excel Tools Devices Apple Wireless Charging Vendor Management Google Docs Emergency Computing Infrastructure Accountants BDR Save Time Tip of the week Downtime Thought Leadership iPhone Cortana webinar User Error Windows 10s Best Practice Relocation Telecommuting Windows Server 2008 Experience Root Cause Analysis Safety Google Apps Voice over Internet Protocol Software Tips Users Monitor Conferencing Content Management Content Practices Remote Work Hiring/Firing Windows 7 Botnet Music Information Technology Search Addiction Workers Blockchain Transportation Virtual Reality Emails Audiobook Internet Exlporer Solid State Drive Video Games Hosted Computing Humor Employer Employee Relationship Flash Travel Wearable Technology Meetings How to Cache Networking HIPAA Multi-Factor Security Benefits Worker Commute Data storage Entertainment Audit Inventory Loyalty Credit Cards Computer Accessories USB Black Market Wireless Internet Current Events Password Manager IT solutions Human Resources Trending Firewall Physical Security Sync Internet exploMicrosoft Computer Fan Scalability Access Control SaaS Fraud Bluetooth Troubleshooting Data loss Knowledge Business Mangement IT Support Staff Smart Technology Advertising The Internet of Things Authentication Amazon Wireless Screen Mirroring Network Congestion Gmail Specifications Two Factor Authentication HBO Telephony Risk Management FENG Nanotechnology Assessment Amazon Web Services WiFi CrashOverride Twitter Webinar Wire Thank You Sports Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.
Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...