XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at XFER. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at 734-927-6666 / 800-Get-XFER.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 27 May 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Backup Best Practices Software Managed Service Provider Workplace Tips Business Computing Small Business Hackers Hosted Solutions Google Mobile Office Data Productivity Hardware Mobile Devices VoIP Quick Tips Gadgets Email Malware IT Support Efficiency Network Business Management Social Media Business Continuity Virtualization IT Services Network Security Business Smartphones Server Upgrade Miscellaneous Innovation Windows Disaster Recovery Communication Microsoft Office Users Managed IT Services Mobile Device Management Computer Communications Passwords User Tips Android Smartphone Browser Marketing Holiday WiFi Alert Save Money Data Backup Vendor Management Mobile Computing Ransomware Remote Monitoring Cybercrime Windows 10 Operating System Computers Avoiding Downtime Bring Your Own Device Apple BYOD Information Technology VPN Cloud Computing Chrome Data Recovery Current Events Best Practice History Big Data Going Green Remote Computing IT Solutions Telephone Systems The Internet of Things Outsourced IT Collaboration Hacking Health Phone System Automation Wireless Technology Social Engineering Internet of Things Spam Router Employer-Employee Relationship IT Consultant BDR Trending Firewall Application Bandwidth Lithium-ion Battery Proactive IT Excel Office App Budget Printer Cybersecurity Business Managament How To iPhone Fax Server Money Maintenance Windows 8 Content Filtering Business Intelligence Two-factor Authentication Tech Term Managed IT Services Mobility Facebook Artificial Intelligence Recovery Redundancy Tutorials Law Enforcement Virus Value Customer Relationship Management Hard Drives Mouse Website Phishing Networking Data Protection Gmail Antivirus Apps Managed IT Analytics User Error Data Security PowerPoint Unified Threat Management Humor Outlook Private Cloud Data Management Save Time Office 365 Tablet Search Twitter Productivity Inbound Marketing Office Tips Streaming Media Risk Management Compliance Windows 10 Tech Support Flexibility Administration Google Drive Saving Time Mobile Device Digital Payment Retail Vulnerability Social Networking Computer Repair Downtime Identity Theft Memory Network Congestion Conferencing People IT Management Computer Accessories DDoS Samsung Smart Tech CES Robot Solid State Drive Sports Webinar Data loss Black Market Online Currency Training Encryption IT Plan Document Management Point of Sale Spam Blocking Social Recycling Wireless Physical Security Cleaning Infrastructure Public Cloud Statistics Unsupported Software Touchscreen SaaS Skype Update Entertainment Programming Data storage Word Scam OneNote Intranet Environment Running Cable Comparison Settings Data Storage Video Surveillance Human Resources eWaste Internet Exlporer Wearable Technology Biometrics PDF Wi-Fi Work/Life Balance Data Breach HaaS End of Support IT service Safety Piracy Hacker Government Best Available IBM Meetings Workers Leadership Bluetooth Administrator Credit Cards Access Control Supercomputer PC Care Mobile Cortana Bloatware Internet exploMicrosoft Computer Fan Millennials Managing Stress Domains 3D Servers Wireless Charging Science Scheduling Multi-Factor Security Strategy NarrowBand Fraud USB Content Filter Customers Uninterrupted Power Supply Frequently Asked Questions eBay Authentication Applications Knowledge Professional Services Alerts Google Apps Entrepreneur Advertising FENG Workforce Flash Fiber-Optic Tablets Distributed Denial of Service Files Help Desk Patch Management Lifestyle Insurance Chromecast Tip of the week Text Messaging Amazon Hiring/Firing Storage 360 Emails Software as a Service Content Management Windows Media Player Virtual Desktop Analysis Password IT Security Education Screen Mirroring Nanotechnology Tools Work Station Cost Management Notifications Print Server Electronic Medical Records Gaming Console Telecommuting Remote Support Business Owner Sync Cables Upgrades Analyitcs Colocation nternet Crowdfunding Windows 10s Practices Laptop Cast Windows Server 2008 Amazon Web Services SharePoint Addiction Blockchain Customer Service Accountants Shadow IT Charger Connectivity Company Culture HIPAA IT Support Password Manager Instant Messaging Hybrid Cloud Law Firm IT Hiring/Firing Software Tips Remote Work Consultant Augmented Reality Macro Telephony Unified Communications IaaS Computing Infrastructure Hosted Computing Touchpad Computer Care Windows 7 Online Shopping Cache Relocation LinkedIn Hosted Solution Google Docs Staff Cameras Legal Co-managed IT Devices Monitor Net Neutrality Keyboard Botnet Business Mangement Licensing Windows 8.1 Update Start Menu Theft Virtual Reality File Sharing Audit Webcam Data Warehousing Specifications WIndows 7 Inventory Regulations Evernote Wireless Internet Netflix Voice over Internet Protocol Digital Signature Printer Server Shortcut IoT YouTube Display User Thought Leadership Reputation Travel Criminal Worker Commute Debate Root Cause Analysis HBO Battery Content Two Factor Authentication Wire Emergency Video Games Music Worker Audiobook Assessment Scalability Thank You Rootkit Politics Television Transportation How to Congratulations Troubleshooting Webinar Techology Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Smart Technology Loyalty Books Experience

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *