Infracore LLC Blog

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at Infracore LLC. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at (858) 509-1970.

Perpetrators of Three Major Cyber Crimes Have Pled...
Tip of the Week: Filters and Labels Help Organize ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 20 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Network Security Business computing Google Hackers Malware Software Microsoft Innovation Internet Data Hardware Smartphones Backup Tech Term Email Hosted Solutions Windows 10 Browser Android Business Continuity Business VoIP Mobile Devices Computer IT Services Managed IT Services User Tips Alert Workplace Tips Data Backup Small Business Miscellaneous Cloud Computing Smartphone Productivity Ransomware Outsourced IT Office Computers Communications Disaster Recovery Business Management Data Recovery Artificial Intelligence Communication Efficiency Cybercrime Law Enforcement Router Productivity Managed IT Services Money Passwords Windows 10 Password Applications Social Media Internet of Things How To Facebook Virtualization Telephone Systems Windows Collaboration Cybersecurity Chrome Network Quick Tips Saving Money Server Upgrade App Health Office 365 Social Engineering Gadgets Work/Life Balance Office Tips Word Scam Data Breach IT Support Data Security Two-factor Authentication IT Support Microsoft Office Hacking Connectivity Vulnerability Wi-Fi Spam Bring Your Own Device Save Money Private Cloud Holiday Mobile Device Management Apps Keyboard Information Data Protection Google Drive HaaS Automation Phishing Operating System Battery Cleaning Managed Service End of Support Business Intelligence Worker Virtual Assistant Blockchain Big Data Unsupported Software History Identity Theft Computer Care Remote Monitoring Remote Computing Update Encryption Telephone System Managed IT Infrastructure Sports Flexibility Windows 7 PDF Samsung Electronic Medical Records VPN Training Legal Bandwidth Settings Entertainment Mobility Automobile BYOD Managed Service Provider Fraud USB Value Data Storage Government BDR Firewall Networking Comparison OneNote Data Management Employer-Employee Relationship Redundancy IT Management Website CES Spam Blocking Public Cloud Charger Avoiding Downtime Mobile Device Paperless Office Patch Management Marketing Content Management IT Plan Machine Learning Tip of the week Hybrid Cloud Remote Work Experience Practices Data loss Video Games Audiobook Data storage Recovery Recycling Two Factor Authentication Knowledge Risk Management Digital Signature Downtime Workers Addiction Wire Printer How to Hiring/Firing Enterprise Content Management The Internet of Things Worker Commute Online Shopping Smart Tech Unified Threat Management webinar YouTube Windows 10s Windows Server 2008 Education Apple Music Hosted Computing MSP Screen Mirroring eWaste Network Congestion Black Market Internet exploMicrosoft Millennials Politics Rootkit Root Cause Analysis Transportation Cache Safety Mouse HBO Multi-Factor Security HIPAA Employer Employee Relationship Password Management FENG Telephony Evernote Books Assessment Mobile Computing Conferencing Software Tips Computing Infrastructure iPhone Credit Cards Wearable Technology Inventory File Sharing Cast Scalability Criminal IT Consultant Advertising Workforce Botnet Password Manager Benefits Smart Office Outlook Relocation User Error Trending Human Resources Computer Accessories NIST Skype Wireless Charging Devices Television Camera Emails Wireless Solid State Drive Flash Access Control Augmented Reality Google Docs Leadership Frequently Asked Questions Accountants Vendor Management Meetings Travel Best Practice Monitor Business Mangement Document Management Staff Bluetooth Cryptocurrency Start Menu Cortana Emergency Thought Leadership Public Computer Servers Audit Techology Users Amazon Troubleshooting Authentication Loyalty Remote Worker Information Technology Save Time Excel Telecommuting Content Gmail Smart Technology Current Events Humor Internet Exlporer Specifications Safe Mode Tools Google Apps Wireless Internet Warranty IT solutions Physical Security Search HVAC Computer Fan Sync Virtual Reality Amazon Web Services Nanotechnology SaaS Wiring Instant Messaging Files Voice over Internet Protocol Thank You Company Culture WiFi Compliance Administrator Congratulations Managing Stress Regulation Printers Webinar CrashOverride Twitter

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Sybil Stephens Is a Data Backup Really That Necessary? In a Word: Yes
20 October 2018
Backup data for the word Microsoft is really needed that only some written material will be come to ...
JeffreyKGuertin Tech Term: Modems and Routers Defined
18 October 2018
Thank you so much for defining here the modems and routers to give us better information about this....
Shay Stuart How the Convenience of The Internet of Things Can Come Back to Bite Us
17 October 2018
This is a very important share that delivers facts about the utilization of internet tools in differ...
Isla Tait It Pays to Outsource Your IT
15 October 2018
New IT project that show us a new outcome that has been to prepare this setup that was god to know o...
ClarenceEHaynes 11 Ways to Enhance Android Security
15 October 2018
I really impressed from your working, after reading this 11 ways to enhance android security and dis...