(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-78946278-1', 'auto'); ga('send', 'pageview');
407-478-6600    Get SUPPORT

TaylorWorks Blog

TaylorWorks has been serving the Longwood area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at TaylorWorks. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at 407-478-6600.

Perpetrators of Three Major Cyber Crimes Have Pled...
Tip of the Week: Filters and Labels Help Organize ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 25 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Cloud Managed IT Services Network Security Privacy Technology Best Practices Business Computing Hackers VoIP Microsoft Data Backup Software Backup Outsourced IT Email Google Business Continuity Mobile Devices Malware Small Business Saving Money IT Support Hosted Solutions Data Recovery Disaster Recovery Android Cloud Computing Efficiency How To Innovation Cybersecurity Business Smartphones Hardware Data Chrome User Tips Managed IT Services Cybercrime Law Enforcement Communications Communication Ransomware Avoiding Downtime BDR Two-factor Authentication Managed IT Internet of Things Computers Gadgets Browser Data Security Mobility Virtualization Windows Internet Router Compliance Business Intelligence App IT Services Remote Monitoring Money Collaboration Proactive IT Spam Telephone Systems Mobile Device Management Alert BYOD Business Management Windows 10 Phishing Social Engineering Word Apps OneNote Credit Cards Budget Data Breach Flexibility Spam Blocking Employer-Employee Relationship Information Technology Smartphone Redundancy Social Media Operating System Network Value Bandwidth Data Protection Work/Life Balance Server Wi-Fi Comparison Workers Computer Passwords Data Storage Vulnerability Firewall Solid State Drive Office 365 Productivity Business Owner Holiday Private Cloud IT Management Document Management Bring Your Own Device IT Plan CES Unsupported Software Artificial Intelligence Identity Theft Save Money Settings PDF Theft Blockchain Patch Management Trending Software Tips Black Market HaaS webinar Productivity The Internet of Things Servers Hacking Botnet HIPAA Google Drive Computer Care Google Apps Human Resources Scam Lifestyle Physical Security Battery Facebook Conferencing Fraud Big Data Flash Travel Users Data loss Remote Computing Samsung Infrastructure Staff Mobile Computing Education Downtime IT Support Computing Infrastructure Amazon Upgrade Data Management Screen Mirroring Password Manager Digital Signature Wireless HBO Applications Root Cause Analysis Amazon Web Services Windows 10 Sync Software as a Service Cast Windows 10s Business Mangement Networking Outlook Meetings End of Support Online Shopping Telephony Government Cortana SaaS Gmail Current Events Health Specifications Wireless Technology Frequently Asked Questions Virtual Reality Office Tips Training Evernote Skype Update Marketing Audit Recycling Hacker Knowledge Microsoft Office Millennials Excel Worker Commute Legal Emails Wireless Charging Start Menu Content Filtering Data Warehousing Technology Tips eWaste Password Network Congestion Workforce Website Tip of the week Charger Fiber-Optic Mobile Google Docs Recovery Computer Fan Criminal IT Consultant Electronic Medical Records Telecommuting Windows Server 2008 Mobile Device Hard Drives Public Cloud Cables Professional Services Voice over Internet Protocol FENG Leadership Remote Work Windows 7 Save Time Risk Management Netflix Unified Threat Management Unified Communications Keyboard Tools Content Management Multi-Factor Security Regulations Politics Cleaning Tech Support Experience Safety Quick Tips Computer Accessories Video Games Hiring/Firing Music Competition CrashOverride Fun Colocation Bluetooth Automobile Wearable Technology Automation Miscellaneous Transportation USB Scalability Benefits Search Internet Exlporer Worker Troubleshooting Loyalty Encryption Smart Technology Presentation Rootkit Content Hosted Solution Workplace Tips 5G Managed Service Provider Internet exploMicrosoft IBM Audiobook Instant Messaging Files Two Factor Authentication Entertainment Advertising Vendor Management Customer Relationship Management WiFi How to Assessment IP Address History Best Practice Webinar Customer Service Books Office Television Mobile Office Techology Domains IT solutions Shadow IT Relocation Public Computer User Error Public Speaking Hybrid Cloud Lithium-ion battery Emergency Humor Augmented Reality Employer Employee Relationship

      Mobile? Grab this Article!

      QR-Code dieser Seite