XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at XFER. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at 734-927-6666 / 800-Get-XFER.

Perpetrators of Three Major Cyber Crimes Have Pled...
Tip of the Week: Filters and Labels Help Organize ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Productivity Data Hosted Solutions Hackers Google Mobile Office Hardware Mobile Devices VoIP Gadgets Email Quick Tips Malware Network Efficiency IT Support Social Media Business Management Innovation Miscellaneous Business Continuity Smartphones IT Services Network Security Server Business Virtualization Upgrade Windows Disaster Recovery Communication Managed IT Services Microsoft Office Communications Computer Users Passwords Mobile Device Management User Tips Data Backup Android Browser Smartphone Marketing Alert WiFi Holiday Save Money Vendor Management Data Recovery Windows 10 Outsourced IT Ransomware Cybercrime Operating System Mobile Computing Remote Monitoring Tech Term Bring Your Own Device Apple Cloud Computing BYOD Computers Information Technology Internet of Things Avoiding Downtime BDR Telephone Systems Big Data Remote Computing Router Current Events IT Solutions Going Green Chrome Best Practice The Internet of Things History Automation VPN Spam Cybersecurity Wireless Technology IT Consultant Health Application Trending Collaboration Hacking Artificial Intelligence Social Engineering Employer-Employee Relationship Firewall Phone System Facebook Proactive IT Lithium-ion Battery Budget Bandwidth Excel App Money Printer Managed IT Services Office Two-factor Authentication Business Managament Business Intelligence Content Filtering Mobility How To Fax Server Recovery Maintenance Windows 8 Networking iPhone Humor Mouse Outlook Private Cloud Tutorials Antivirus Redundancy Virus Law Enforcement Analytics Office 365 Apps Applications Phishing Data Protection PowerPoint Unified Threat Management Website Value Managed IT Gmail Customer Relationship Management User Error Data Security Hard Drives Retail Inbound Marketing IT Management Saving Time Data Management Network Congestion Administration Mobile Device Productivity Social Networking Downtime Digital Payment Computer Repair File Sharing Memory Windows 10 Analysis Save Time Tech Support Conferencing Blockchain Office Tips Word Google Drive IT Support Vulnerability Tablet Compliance Sports Search Connectivity Twitter Flexibility Document Management Identity Theft Entertainment Streaming Media Risk Management Environment Social Safety Wi-Fi Statistics Settings HaaS End of Support Credit Cards Human Resources YouTube Government Workers Skype Biometrics Meetings Programming Servers IT service Access Control Touchscreen Augmented Reality Intranet Hacker Data loss Running Cable CES Smart Tech DDoS Webinar Solid State Drive IT Plan Wearable Technology Spam Blocking Machine Learning Black Market Encryption Content Management Information Video Surveillance Cleaning Password Best Available Infrastructure Robot Wireless Physical Security Unsupported Software USB Public Cloud Bluetooth IBM Paperless Office Update People Piracy SaaS Leadership OneNote Samsung Administrator Scam Data storage Comparison Windows 7 Online Currency Data Storage Computer Accessories Internet Exlporer Point of Sale eWaste Recycling Training PDF Instant Messaging Work/Life Balance Data Breach Education Netflix Regulations Evernote Healthcare Print Server Voice over Internet Protocol Digital Signature Inventory Remote Monitoring and Maintenance Remote Support HBO Wireless Internet Root Cause Analysis nternet Travel Crowdfunding Criminal Cameras IoT Telephone System Text Messaging Thought Leadership Work Station Computer Fan Mobile Cortana Gaming Console NIST Reputation Supercomputer Millennials Licensing Company Culture Wireless Charging Virtual Reality Electronic Health Records Law Firm IT Multi-Factor Security Strategy WIndows 7 Line of Business Internet exploMicrosoft Frequently Asked Questions Fraud Wire NarrowBand Printer Server Shortcut Content Filter Uninterrupted Power Supply FENG Professional Services LinkedIn Google Apps Worker Commute Cryptocurrency Customers Knowledge Workforce User Patch Management Flash Net Neutrality Fiber-Optic Bloatware Help Desk Lifestyle Managing Stress Domains Authentication MSP Advertising Tip of the week Windows 8.1 Update Amazon Science Smart Office Chromecast Screen Mirroring Software as a Service Insurance Distributed Denial of Service Files 360 Emails Storage Electronic Medical Records Tools Safe Mode Display Telecommuting Notifications Windows 10s Sync Cables Entrepreneur Webcam HVAC Business Owner Debate Nanotechnology Windows Server 2008 Amazon Web Services Tablets Laptop Charger Cast Practices Managed Service Colocation Hiring/Firing Addiction Shadow IT Hiring/Firing Password Manager Windows Media Player Virtual Desktop Accountants Business Technology SharePoint HIPAA Software Tips Remote Work Hybrid Cloud Macro Telephony Unified Communications Cost Management Enterprise Content Management PC Care Hosted Solution Online Shopping Upgrades Analyitcs Scheduling Students Touchpad Computer Care Google Docs Staff Hosted Computing 3D Proactive IaaS Computing Infrastructure Co-managed IT Cache Legal Botnet Business Mangement Customer Service Virtual Assistant eBay Relocation Keyboard Alerts Audit Start Menu Theft Password Management Monitor Data Warehousing IT Security Specifications Consultant Devices Books Loyalty Experience Two Factor Authentication Content Emergency Battery Video Games Worker Regulation Music Audiobook Assessment Scalability Thank You Rootkit Politics Transportation Television Remote Worker Troubleshooting Webinar How to Congratulations Techology Benefits Automobile Public Computer Wiring IT solutions Employer Employee Relationship CrashOverride Smart Technology

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *