XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at XFER. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at 734-927-6666 / 800-Get-XFER.

Perpetrators of Three Major Cyber Crimes Have Pled...
Tip of the Week: Filters and Labels Help Organize ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 17 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Data Hackers Small Business Google Mobile Devices Hardware Productivity VoIP Mobile Office Malware Email Gadgets Quick Tips Network Security Efficiency Network Innovation IT Support IT Services Social Media Business Management Business Business Continuity Smartphones Server Miscellaneous Upgrade Communication Virtualization Disaster Recovery User Tips Windows Communications Data Backup Computer Microsoft Office Managed IT Services Smartphone Users Passwords Browser Mobile Device Management Data Recovery Holiday Android Save Money WiFi Marketing Ransomware Outsourced IT Alert Tech Term Mobile Computing BDR Cybercrime Vendor Management Internet of Things Router Chrome Operating System Cloud Computing Remote Monitoring Windows 10 Apple Artificial Intelligence BYOD Computers Information Technology Automation Avoiding Downtime Bring Your Own Device Current Events Going Green History Best Practice Managed IT Services Telephone Systems Cybersecurity Spam VPN Big Data Firewall Remote Computing IT Solutions The Internet of Things Health IT Consultant Application Collaboration Hacking Social Engineering Printer Facebook Employer-Employee Relationship Phone System Trending Wireless Technology Money Excel Bandwidth App Proactive IT Productivity Office Lithium-ion Battery Windows 10 Mobility Budget Fax Server IT Support Mobile Device Maintenance Recovery Windows 8 Unified Threat Management Networking Business Intelligence How To Office 365 iPhone Applications Mouse Business Managament Phishing Two-factor Authentication Content Filtering Google Drive Managed IT Access Control Sports Apps Value PowerPoint Information Private Cloud Website Redundancy Law Enforcement User Error Antivirus Data Protection Gmail Encryption Customer Relationship Management Humor Blockchain Analytics Training Hard Drives Word Outlook Tutorials Settings Virus Data Security Conferencing Voice over Internet Protocol Network Congestion Hacker Administration Vulnerability Digital Payment IT Management Search Social Networking Tablet Computer Repair Servers Tech Support Twitter Save Time Document Management Wi-Fi Risk Management Scam Machine Learning Streaming Media Office Tips Analysis Data Management Administrator Software as a Service Compliance Managed Service Flexibility Saving Time Entertainment Connectivity Retail Downtime Social Inbound Marketing Human Resources File Sharing Memory Identity Theft Touchscreen Bluetooth IT service Help Desk Telephone System People OneNote Data storage Samsung Credit Cards eWaste Internet Exlporer Data Storage Keyboard Smart Tech PDF Online Currency Video Surveillance Work/Life Balance Data Breach USB Point of Sale HaaS End of Support Fraud Recycling Robot Safety CES Government IT Plan Education YouTube Meetings Workers Statistics IBM Piracy Leadership Content Management Skype DDoS Unsupported Software Programming Infrastructure Solid State Drive Data loss Paperless Office Computer Accessories Running Cable Augmented Reality Intranet Black Market Update Spam Blocking Instant Messaging Wearable Technology Wireless Physical Security Comparison Environment Cleaning Password Telephony Virtual Assistant Public Cloud Windows 7 Google Docs Best Available SaaS Webinar Biometrics Display Botnet SharePoint Data Warehousing Specifications Inventory Remote Monitoring and Maintenance Virtual Reality Debate Shadow IT Start Menu Theft Charger Cast Healthcare Shortcuts WIndows 7 Digital Signature HIPAA IoT Hybrid Cloud Regulations Evernote Hiring/Firing Wireless Internet Warranty Printer Server Shortcut NIST User IaaS Computing Infrastructure HBO Thought Leadership E-Commerce Worker Commute Touchpad Travel Criminal Relocation Millennials Hosted Solution Line of Business Bloatware Legal Mobile Cortana Computer Care Electronic Health Records eCommerce Managing Stress Domains Monitor Multi-Factor Security Strategy Science Wireless Charging Wire Microchip Cryptocurrency Frequently Asked Questions Audit Content Filter Camera Workforce Netflix Authentication MSP Entrepreneur IT Security Webcam Professional Services Google Apps Vendor Reputation Lifestyle Insurance Tablets Print Server Flash Fiber-Optic Macro Root Cause Analysis Smart Office Supercomputer Safe Mode Hiring/Firing nternet Crowdfunding Internet exploMicrosoft Tip of the week Amazon Co-managed IT Computer Fan Storage Windows Media Player Remote Support Virtual Desktop PC Care Telecommuting Nanotechnology Remote Worker Cost Management NarrowBand Tools HVAC Security Cameras Customers Practices Upgrades Analyitcs Law Firm IT Scheduling Uninterrupted Power Supply Sync Cables Search Engine Company Culture 3D Knowledge Accountants Business Technology Advertising Windows Server 2008 Amazon Web Services FENG Addiction Virtual Private Network Customer Service eBay Consultant LinkedIn Alerts Distributed Denial of Service Files Software Tips Remote Work Patch Management Wiring Chromecast Password Manager Enterprise Content Management 360 Emails Hosted Computing Proactive Unified Communications Screen Mirroring Students Bing Net Neutrality Notifications Online Shopping Electronic Medical Records Cache Project Management Cameras Windows 8.1 Update Text Messaging Staff Password Management Licensing Work Station Colocation Windows 10s Devices GDPR Gaming Console Laptop Business Mangement Business Owner Smartwatch Troubleshooting Webinar Techology Automobile Public Computer Benefits Thank You IT solutions Regulation Employer Employee Relationship CrashOverride Smart Technology Congratulations Books Loyalty Experience Utility Computing Content Two Factor Authentication Printers Battery Emergency Video Games Music Worker Audiobook Employee/Employer Relationship Scalability Assessment Rootkit Politics Television Transportation How to

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *