XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at XFER. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at 734-927-6666 / 800-Get-XFER.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 24 February 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Microsoft Privacy Internet Cloud Saving Money Backup Software Best Practices Managed Service Provider Workplace Tips Small Business Business Computing Mobile Office Hackers Google Productivity Hardware Mobile Devices Data Hosted Solutions VoIP Quick Tips Gadgets Email IT Support Malware Efficiency Social Media Network Business Management Business Continuity Smartphones Business Server Upgrade Miscellaneous Innovation Virtualization Windows IT Services Disaster Recovery Network Security Communication Users Microsoft Office Computer Mobile Device Management Managed IT Services Communications User Tips Android Passwords Marketing WiFi Browser Holiday Vendor Management Smartphone Alert Save Money Operating System Remote Monitoring Windows 10 Mobile Computing Data Backup Bring Your Own Device Apple Information Technology Avoiding Downtime BYOD Going Green History Remote Computing Telephone Systems Computers Current Events Ransomware Chrome Cybercrime Best Practice IT Solutions Outsourced IT The Internet of Things Health IT Consultant Hacking Spam Firewall Wireless Technology Application Social Engineering Employer-Employee Relationship Big Data Trending Phone System Collaboration Automation Proactive IT Excel BDR Printer Cloud Computing VPN Data Recovery Router App Office Budget Lithium-ion Battery Bandwidth Windows 8 Money Managed IT Services Two-factor Authentication Mobility Business Managament Fax Server Maintenance Internet of Things Cybersecurity How To Facebook iPhone Recovery Content Filtering Networking PowerPoint Antivirus Unified Threat Management Customer Relationship Management User Error Humor Private Cloud Tutorials Artificial Intelligence Virus Value Business Intelligence Gmail Analytics Hard Drives Outlook Mouse Search Digital Payment Computer Repair Tech Support Office 365 Google Drive Saving Time Managed IT Retail Memory Conferencing Redundancy Windows 10 Law Enforcement Apps Save Time Administration Tablet Social Networking Office Tips Website Compliance Data Security Risk Management Flexibility Downtime Inbound Marketing Data Management Network Congestion Phishing Data Protection Sports Touchscreen Samsung Twitter Robot Online Currency Word Wireless Vulnerability Point of Sale Meetings Physical Security Public Cloud Comparison Data Storage IBM Administrator Scam Workers Entertainment eWaste Programming PDF Environment IT Management Wearable Technology Running Cable Wi-Fi Safety Government Training IT Plan Social DDoS Solid State Drive Webinar Unsupported Software Productivity People Black Market OneNote Recycling Mobile Device Document Management Streaming Media SaaS Video Surveillance Identity Theft Data Breach Statistics Data storage Piracy Leadership Credit Cards Internet Exlporer Intranet Skype Work/Life Balance Settings Human Resources HaaS Computer Accessories End of Support CES Biometrics Spam Blocking IT service Hacker Bluetooth Best Available Advertising Cables Science Encryption Cast Charger Patch Management IT Support Blockchain Amazon Web Services Chromecast Windows Server 2008 Unified Communications Tablets Notifications IT Security Computer Care Staff Virtual Desktop Online Shopping Laptop Windows Media Player Windows 7 Botnet SharePoint Education Audit nternet HIPAA Hybrid Cloud Theft Analyitcs Specifications Upgrades Data Warehousing Crowdfunding Digital Signature Customer Service Evernote Touchpad Macro Regulations Company Culture Consultant Travel Computer Fan Keyboard Relocation Scheduling Cortana PC Care Millennials Net Neutrality Cameras Servers Licensing FENG File Sharing eBay Alerts Google Apps Virtual Reality Workforce Display Emails Shortcut Printer Server Flash User Software as a Service Text Messaging Work Station Infrastructure Bloatware Telecommuting Uninterrupted Power Supply Sync USB Update Distributed Denial of Service Help Desk 360 Files Password Password Manager Entrepreneur Remote Work Cleaning Software Tips Electronic Medical Records Business Owner Telephony Webcam Google Docs Hiring/Firing Print Server Colocation Remote Support Business Mangement Cost Management Shadow IT Hiring/Firing Netflix Start Menu Voice over Internet Protocol IaaS Root Cause Analysis Law Firm IT Hosted Solution Computing Infrastructure Augmented Reality Legal Criminal Instant Messaging Co-managed IT HBO Supercomputer Monitor Mobile Wireless Charging 3D Multi-Factor Security Data loss Fraud YouTube Frequently Asked Questions Windows 8.1 Update LinkedIn Knowledge Reputation WIndows 7 Professional Services Internet exploMicrosoft Fiber-Optic Gaming Console Lifestyle Screen Mirroring Content Management Amazon NarrowBand Worker Commute Tip of the week Tools Debate Windows 10s Domains Customers Managing Stress Scalability Thank You Politics Transportation How to Congratulations Loyalty Benefits Smart Technology Experience Assessment Two Factor Authentication Battery Music Television Webinar Applications Public Computer IT solutions CrashOverride Employer Employee Relationship Troubleshooting Techology Automobile Worker Books Content Rootkit Emergency Video Games Audiobook

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *