shutterstock 4600 TEST SIZE V1 051716

 

 "IT Management that You can count on."

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at TWINTEL Solutions. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at (888) 894-6411.

Today is the 10th Anniversary of Data Privacy Day
Tip of the Week: Filters and Labels Help Organize ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Hackers Network Security Hosted Solutions Backup Malware Mobile Devices Google Data VoIP Microsoft Business Disaster Recovery Email bgc Internet roundup Software communications nonprofit Business Continuity IT Services Innovation User Tips Managed IT Services Outsourced IT Alert Smartphones Hardware Data Backup Productivity Tech Term Browser Windows 10 Managed IT Services Computer Cloud Computing Smartphone Data Recovery Ransomware Efficiency Server Saving Money Cybercrime Android Workplace Tips Internet of Things IT Support BDR Computers Communication IT Support Business Management Small Business Network Miscellaneous Windows Passwords Artificial Intelligence Quick Tips Save Money Cybersecurity Productivity Office Holiday Windows 10 Recovery Router Applications Gadgets Money Mobile Device Management Social Engineering Managed IT Mobile Device Mobility Telephone Systems Chrome BYOD Wi-Fi Work/Life Balance Hacking Upgrade Law Enforcement Office 365 Virtualization Facebook Proactive IT Collaboration Private Cloud Vulnerability Health Automation Firewall Social Media Phishing Information Google Drive Data Protection Password VPN Two-factor Authentication Remote Monitoring Office Tips Bring Your Own Device Avoiding Downtime Bandwidth How To Budget Flexibility Compliance Word Managed Service Provider Microsoft Office App Spam Connectivity Data Breach Information Technology Managed Service Encryption History Voice over Internet Protocol Remote Computing Black Market Software as a Service Settings Operating System Data Security Scam HaaS Save Time Servers Value Sports Identity Theft Mobile Computing Redundancy Business Intelligence Apps Keyboard Safety Computing Infrastructure Cleaning Solid State Drive Telephony Training Workers Marketing Unsupported Software CES Business Owner Data Storage Website Emergency Hacker Computer Care Big Data Patch Management Content Management The Internet of Things Document Management Access Control Physical Security IT Management OneNote Legal Samsung Charger HIPAA Comparison Blockchain Virtual Assistant Risk Management IT Plan Electronic Medical Records End of Support Update Human Resources Telephone System Automobile Data storage Worker Employer-Employee Relationship WiFi Infrastructure Paperless Office Credit Cards Unified Threat Management Spam Blocking USB Wireless Technology Data Management YouTube Hiring/Firing Entertainment PDF Google Docs SaaS Machine Learning Battery Content Filtering Government Windows 7 Fraud Mobile Cache Windows 10s Troubleshooting Relocation Workforce Smart Technology Botnet Digital Signature Network Congestion Fiber-Optic Scalability Warranty Experience Shortcuts Cryptocurrency Files Employer Employee Relationship ISP Inventory webinar Wiring Business Mangement HVAC Education Regulations Amazon Professional Services Wireless Internet Public Cloud Humor Frequently Asked Questions Telecommuting Two Factor Authentication Smartwatch Skype Cables Vendor Management Devices Printer Software Tips Social IBM Techology Safe Mode Amazon Web Services Computer Accessories Conferencing Microchip Gmail Assessment Networking Apple Employee Accountants IT Consultant Chromecast MSP Internet Exlporer Meetings Cortana Wire Shadow IT Laptop Books Excel Remote Work Start Menu Unified Communications Thought Leadership Instant Messaging Mouse Vendor Supercomputer Online Shopping Bluetooth Authentication Netflix Multi-Factor Security Search Engine Recycling Television Enterprise Content Management CrashOverride Users iPhone Digital Signage Leadership Best Practice File Sharing Content Data loss Google Apps Smart Office Audit Touchpad Hosted Solution Tip of the week Tools Theft Twitter Search Administrator HBO Specifications Transportation Display Current Events NarrowBand User Error Flash Evernote Nanotechnology Camera Politics Wireless Trending Bing eWaste Public Computer Password Management Virtual Reality Downtime Google Search Practices Augmented Reality Audiobook Reputation Advertising Screen Mirroring Loyalty Computer Fan Windows Server 2008 Addiction How to Going Green Hard Drives Outlook Millennials Benefits Security Cameras Staff Knowledge Regulation Monitor Colocation Sync Wireless Charging Rootkit Smart Tech Printers Data Warehousing Lifestyle Help Desk Criminal NIST Worker Commute Robot Net Neutrality Hosted Computing Video Games Remote Worker Customers Cast Password Manager FENG Thank You Congratulations nonprofits GDPR E-Commerce