XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at XFER. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at 734-927-6666 / 800-Get-XFER.

Perpetrators of Three Major Cyber Crimes Have Pled...
Tip of the Week: Filters and Labels Help Organize ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 16 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Workplace Tips Managed Service Provider Business Computing Hackers Data Small Business Hosted Solutions Hardware Mobile Devices Google Productivity Mobile Office VoIP Gadgets Email Malware Quick Tips Network Security Efficiency Network IT Support Social Media Innovation Business Management IT Services Smartphones Miscellaneous Business Continuity Server Upgrade Business Virtualization Communication Windows Disaster Recovery Computer Communications Microsoft Office Managed IT Services Data Backup User Tips Users Mobile Device Management Passwords Browser Android Save Money Smartphone Marketing Ransomware Holiday Data Recovery WiFi Alert Vendor Management Mobile Computing Outsourced IT Tech Term Windows 10 Internet of Things Operating System Remote Monitoring Cybercrime Information Technology Cloud Computing Avoiding Downtime Computers BDR Bring Your Own Device Apple BYOD Going Green Big Data Remote Computing IT Solutions Current Events The Internet of Things VPN Artificial Intelligence Chrome History Best Practice Automation Telephone Systems Router Firewall Cybersecurity Health Trending Application Collaboration Hacking Phone System Social Engineering Wireless Technology IT Consultant Spam Employer-Employee Relationship Facebook Managed IT Services Budget Bandwidth Excel Lithium-ion Battery App Money Printer Proactive IT Office Business Intelligence Applications Two-factor Authentication Mobility Business Managament Unified Threat Management How To Fax Server Recovery Maintenance Windows 8 iPhone Windows 10 Networking Content Filtering Apps Office 365 Humor Antivirus Outlook Data Security Tutorials Analytics PowerPoint Virus Productivity Managed IT Customer Relationship Management Hard Drives Training Phishing Value Mouse Sports Website Private Cloud Gmail Data Protection User Error Redundancy Law Enforcement Social Networking Retail Digital Payment Settings Computer Repair Saving Time Encryption Identity Theft Network Congestion Downtime Information File Sharing Memory IT Management Analysis Google Drive Conferencing Save Time Tech Support Tablet Inbound Marketing Connectivity Search Office Tips Scam Twitter Document Management Compliance IT Support Streaming Media Risk Management Flexibility Administration Vulnerability Data Management Entertainment Blockchain Word Mobile Device Comparison Skype Environment Programming Solid State Drive Work/Life Balance Data Breach Black Market Human Resources Windows 7 Video Surveillance Access Control Augmented Reality Intranet Smart Tech Running Cable Biometrics Password IT service Workers Wireless Physical Security Wearable Technology Cleaning IBM Machine Learning Webinar Hacker Piracy Public Cloud Credit Cards Administrator SaaS Leadership Best Available Data loss Data storage Servers Computer Accessories Bluetooth USB Fraud Managed Service Spam Blocking People Robot CES Paperless Office Internet Exlporer IT Plan Samsung eWaste Social PDF Online Currency Safety Wi-Fi HaaS End of Support Content Management Recycling YouTube Unsupported Software Virtual Assistant Point of Sale Government Infrastructure Meetings Touchscreen OneNote Education Statistics Update Telephone System DDoS Instant Messaging Data Storage NIST Keyboard Customers Telephony Unified Communications Thought Leadership E-Commerce Uninterrupted Power Supply Electronic Health Records Company Culture Online Shopping Line of Business Audit Law Firm IT Cameras Advertising Google Docs Staff Licensing Chromecast Netflix Distributed Denial of Service Files Botnet Business Mangement Wire WIndows 7 Data Warehousing Specifications Webcam Cryptocurrency LinkedIn Virtual Reality Start Menu Theft Content Filter Camera Root Cause Analysis Supercomputer Net Neutrality Regulations Evernote Authentication MSP Computer Fan Notifications Printer Server Shortcut Voice over Internet Protocol Digital Signature Windows 8.1 Update Laptop User HBO Insurance Worker Commute Colocation Travel Criminal Smart Office Shadow IT Managing Stress Domains Millennials Safe Mode SharePoint Bloatware Mobile Cortana PC Care Storage Help Desk Display Scheduling HVAC Knowledge Science Wireless Charging 3D Nanotechnology Remote Worker FENG Debate Hybrid Cloud Multi-Factor Security Strategy Touchpad Frequently Asked Questions eBay Practices Patch Management IaaS Computing Infrastructure Legal Workforce Accountants Business Technology 360 Emails Relocation Entrepreneur Professional Services Google Apps Alerts Addiction Virtual Private Network Screen Mirroring Enterprise Content Management Monitor Tablets Flash Fiber-Optic Wiring Electronic Medical Records Lifestyle Students Business Owner Hiring/Firing Tip of the week Amazon Text Messaging Hosted Computing Proactive Windows 10s Windows Media Player Virtual Desktop Software as a Service Telecommuting Gaming Console Macro Cost Management Tools Work Station Cache Project Management Charger Cast Password Management HIPAA Co-managed IT Upgrades Reputation Analyitcs Sync Cables Devices GDPR Hiring/Firing IT Security Healthcare Windows Server 2008 Amazon Web Services Inventory Remote Monitoring and Maintenance Print Server Internet exploMicrosoft Customer Service Remote Support NarrowBand Consultant Software Tips Remote Work IoT Hosted Solution nternet Crowdfunding Password Manager Wireless Internet Warranty Computer Care Employer Employee Relationship CrashOverride Smart Technology Scalability Regulation Books Loyalty Experience Content Two Factor Authentication How to Emergency Techology Music Printers Worker Audiobook Thank You Assessment Rootkit Politics Congratulations Television Transportation Troubleshooting Webinar Automobile Public Computer Battery Benefits Video Games IT solutions

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name *
      • Number of Participants *
      • First Name *
      • Last Name *
      • Phone *
      • Yes, subscribe me to: