Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at Infracore LLC. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at (858) 509-1970.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 24 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Technology Best Practices Cloud Software Business computing Microsoft Google Windows 10 Backup Network Security Hackers Smartphones Malware Business Android Alert Small Business Business Continuity Managed IT Services Innovation Hardware Data Email Office Hosted Solutions Disaster Recovery Browser Computer VoIP Internet Ransomware Outsourced IT Business Management Computers Efficiency Productivity Law Enforcement Telephone Systems Data Backup User Tips Mobile Devices Cloud Computing How To Smartphone Cybercrime Chrome Virtualization Productivity Windows Health Passwords Work/Life Balance Password Social Media IT Services Quick Tips Money Managed IT Services Social Engineering Communications Miscellaneous Cybersecurity App Collaboration Data Breach Private Cloud Spam Bring Your Own Device Google Drive HaaS Artificial Intelligence Office 365 IT Support Data Recovery Two-factor Authentication Communication Facebook Windows 10 Hacking Office Tips Holiday Wi-Fi Upgrade Router Data Management Operating System Worker Word Workplace Tips Big Data Apps Unsupported Software Battery Government Server Vulnerability Gadgets Samsung Electronic Medical Records Internet of Things Public Cloud Marketing Microsoft Office Value CES Mobile Device Management Redundancy Legal Charger Keyboard Avoiding Downtime History Patch Management Flexibility Data Security Scam PDF Computer Care Mobility Remote Monitoring Managed Service Provider Remote Computing Comparison Data Storage Automation Network OneNote Saving Money Employer-Employee Relationship End of Support IT Management Automobile Spam Blocking Business Intelligence Phishing IT Plan Tip of the week Online Shopping Two Factor Authentication Risk Management eWaste Downtime Millennials webinar Advertising Windows Server 2008 Evernote Windows 10s Wireless Rootkit Politics Managed IT Instant Messaging Criminal Root Cause Analysis Safety Workforce Conferencing Books Software Tips Windows 7 Wireless Charging Training Techology Botnet Google Docs Bandwidth BDR Emails Education BYOD Flash Cortana Solid State Drive Save Money Vendor Management Travel Files Meetings Website Networking Telecommuting Emergency Hybrid Cloud Computing Infrastructure Google Apps Audit Loyalty Save Time Content Management Voice over Internet Protocol Current Events Apple Remote Work IT solutions Applications Physical Security Sync Best Practice Workers Computer Fan SaaS Cleaning Experience Blockchain Data loss Knowledge iPhone Identity Theft IT Support Users Content Mobile Device Infrastructure The Internet of Things Hiring/Firing Network Congestion Music User Error Search HIPAA Screen Mirroring Relocation Multi-Factor Security HBO Credit Cards Transportation Virtual Reality Audiobook Telephony Monitor Video Games Password Manager FENG Assessment Employer Employee Relationship Trending IT Consultant Wearable Technology Recovery How to Human Resources Cast Outlook Fraud Settings Benefits Information Technology Worker Commute Entertainment Skype Business Mangement Television Computer Accessories Leadership USB Update Internet Exlporer Black Market Staff Humor Frequently Asked Questions Amazon Firewall Bluetooth Start Menu Data storage Scalability Gmail Public Computer Specifications Troubleshooting Data Protection Excel Amazon Web Services Smart Technology Tools Recycling Internet exploMicrosoft Digital Signature Thank You Encryption Congratulations WiFi Webinar CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.
Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...