window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at TaylorWorks. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at 407-478-6600.

Perpetrators of Three Major Cyber Crimes Have Pled...
Tip of the Week: Filters and Labels Help Organize ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, November 13 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Privacy Managed IT Services Business Computing Data Backup Hackers Email Malware Data Data Recovery Hosted Solutions VoIP Mobile Devices Outsourced IT Google Tech Term Innovation Microsoft Backup Hardware Internet Cloud Computing Software Business Continuity Saving Money Internet of Things Ransomware BDR User Tips Communications IT Services Android Communication Small Business IT Support Cybersecurity Efficiency Smartphones Business Chrome Workplace Tips Network Productivity Browser Disaster Recovery Managed IT Services Artificial Intelligence Applications Cybercrime Managed IT Computer How To Gadgets Router Business Management Windows 10 Law Enforcement Virtualization Data Security Save Money Computers Smartphone Server Data Protection Money Information IT Support BYOD Business Intelligence Collaboration Mobile Device Management Windows Phishing Avoiding Downtime Two-factor Authentication Training Facebook Firewall Passwords IT Management Redundancy Apps Productivity Connectivity Alert Telephone Systems Office 365 Miscellaneous Proactive IT Identity Theft Bandwidth Upgrade Word Mobility Social Engineering Document Management Social Media Blockchain Servers Spam Analysis Vulnerability Compliance Remote Monitoring App OneNote Telephone System Data loss Solid State Drive Mobile Computing VPN Flexibility Infrastructure Information Technology Password Scam Data Breach Private Cloud IT Plan Voice over Internet Protocol Microsoft Office Spam Blocking Budget CES Sports Windows 7 File Sharing Automation Comparison Big Data Unsupported Software Website Encryption Machine Learning Value Operating System Business Owner Data Storage Holiday Content Management Education Bring Your Own Device Managed Service Keyboard Update Mobile Device Paperless Office Unified Threat Management Credit Cards Access Control Networking Workers Smart Tech Virtual Assistant Work/Life Balance Employer-Employee Relationship Wi-Fi Settings Fraud eWaste Wireless Internet Warranty Tip of the week Workforce Insurance Cryptocurrency Travel webinar E-Commerce Augmented Reality Audit Mobile Content Filter Line of Business Hard Drives Google Docs Wireless Technology Staff Healthcare Computer Care Search Engine Amazon Virtual Reality Fiber-Optic Nanotechnology Knowledge Criminal Wire Emails Printer Windows Server 2008 Telecommuting Black Market Content Filtering Practices Safe Mode Screen Mirroring Password Manager Storage Conferencing Camera HBO Instant Messaging The Internet of Things Accountants HVAC Computing Infrastructure Professional Services Hacking Marketing Hacker MSP HIPAA Digital Signature Electronic Health Records Samsung Bing Sync Amazon Web Services Worker Commute Cables Network Congestion Legal Entertainment Charger Mouse Remote Work Battery Hosted Computing Downtime Cast Public Cloud Software as a Service Business Mangement Cortana Outlook USB Enterprise Content Management Computer Fan Tools Remote Worker Multi-Factor Security Remote Computing Telephony Online Shopping Users Unified Communications Devices Electronic Medical Records IT Consultant Government Smart Office Administrator Regulations Inventory Managed Service Provider Gmail Addiction Virtual Private Network Frequently Asked Questions Specifications Recovery IoT Password Management FENG Business Technology Root Cause Analysis End of Support Data Management Wiring Software Tips Trending Strategy YouTube Windows 10s Skype Evernote Theft Thought Leadership Leadership PDF Wireless Netflix Microchip Health Office Tips Proactive Recycling Cache Project Management Technology Tips Excel Millennials Windows 10 NIST Meetings Botnet GDPR Physical Security Lifestyle SaaS Start Menu HaaS Wireless Charging Save Time Google Apps Streaming Media Remote Monitoring and Maintenance Data Warehousing Google Drive WiFi Risk Management Human Resources Students Cleaning Flash Patch Management Authentication Current Events Content Lithium-ion battery Office Advertising Computer Accessories Music Managing Stress Colocation Politics 5G History Tech Support Two Factor Authentication Audiobook Safety Vendor Management Relocation IBM CrashOverride Regulation Search Bluetooth Wearable Technology Assessment Video Games Techology Transportation Competition Webinar Humor Books Customer Relationship Management Twitter Printers How to Television Internet Exlporer Automobile IP Address Help Desk User Error Benefits Hybrid Cloud Best Practice IT solutions Customer Service Worker Troubleshooting Public Computer Mobile Office Hiring/Firing Scalability Domains Loyalty Smart Technology Emergency Rootkit Quick Tips Shadow IT Hosted Solution Fun Internet exploMicrosoft Employer Employee Relationship Experience Public Speaking Company Culture Presentation Utility Computing Files

Mobile? Grab this Article!

QR-Code dieser Seite