window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at TaylorWorks. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at 407-478-6600.

Perpetrators of Three Major Cyber Crimes Have Pled...
Tip of the Week: Filters and Labels Help Organize ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Data Backup Privacy Hosted Solutions Managed IT Services Hackers Data Recovery Malware Mobile Devices VoIP Email Data Google User Tips Outsourced IT Innovation Tech Term Internet of Things Backup Cloud Computing Productivity Internet Microsoft Communications Business Continuity Hardware IT Services Saving Money Business BDR Efficiency Artificial Intelligence Cybersecurity Software Smartphones Communication Small Business Ransomware Smartphone IT Support Router Disaster Recovery Cybercrime IT Support Android Managed IT Services Chrome Network Applications Workplace Tips Business Management Gadgets Windows 10 Browser How To Mobile Device Collaboration Computer Law Enforcement Managed IT Phishing Office 365 Training Server Money Access Control Holiday Blockchain Mobility Information Data Security Spam BYOD Mobile Device Management Windows Data Protection Two-factor Authentication Save Money Proactive IT Computers Avoiding Downtime Word Virtualization Encryption Business Intelligence Private Cloud Settings Telephone Systems Miscellaneous Upgrade Social Media Document Management Alert Analysis IT Management Redundancy Managed Service Compliance Automation Wi-Fi Voice over Internet Protocol Social Engineering Passwords Firewall Software as a Service Bandwidth Connectivity Apps App Productivity File Sharing Identity Theft Remote Monitoring Facebook Machine Learning Servers Vulnerability Botnet Website Business Owner OneNote Fraud Paperless Office Education Bring Your Own Device Smart Tech Data loss Data Breach Mobile Computing Keyboard Google Docs Human Resources Work/Life Balance Spam Blocking Save Time Infrastructure Business Technology VPN IT Plan Healthcare Health Windows 7 Value Operating System Comparison Virtual Assistant Scam Unsupported Software Telephony Employer-Employee Relationship Google Drive CES Hacker Sports Data Storage Networking Budget Unified Threat Management Telephone System Microsoft Office Flexibility Workers Solid State Drive Update Password Big Data Credit Cards Information Technology Content Management Password Management Current Events Excel Millennials Printer Users Gmail Addiction USB Cleaning Meetings Employee IoT Physical Security Lifestyle Camera Computing Infrastructure Theft Thought Leadership Remote Computing Start Menu Wireless Charging Vendor Strategy YouTube Audit Data Warehousing WiFi MSP Multiple Versions webinar Flash Bing NIST Data Management Knowledge Tip of the week Workforce Mouse Public Cloud Recycling Cache Recovery Computer Care Travel Digital Signage Google Apps Streaming Media Emails Mobile Cortana Display Wireless Remote Worker Restore Data Windows 10 Authentication Conferencing Amazon Help Desk Students Insurance Cryptocurrency Network Congestion Windows Server 2008 Telecommuting Managed Service Provider Administrator eWaste Wireless Internet Samsung Screen Mirroring Google Search Downtime HBO Virtual Private Network End of Support Content Filter Charger Professional Services Security Cameras Computer Fan Wiring Backup and Disaster Recovery Fiber-Optic Nanotechnology Risk Management Sync Amazon Web Services Shortcuts Staff Patch Management Office Tips Practices Augmented Reality Safe Mode Electronic Medical Records IT Consultant Remote Work Microchip PDF Criminal Wire Cast Proactive Outlook Project Management Password Manager Storage Tools Technology Tips Employee/Employer Relationship Wireless Technology Accountants HVAC FENG Multi-Factor Security GDPR HaaS Cables Online Shopping eCommerce Digital Signature Electronic Health Records Virtual Reality Government Remote Monitoring and Maintenance The Internet of Things Hosted Computing Leadership Regulations Marketing Black Market Content Filtering Windows 10s Hacking Frequently Asked Questions Specifications Warranty Business Mangement Instant Messaging Netflix Root Cause Analysis Smartwatch Enterprise Content Management Worker Commute Software Tips Trending E-Commerce Unified Communications Devices HIPAA Skype Evernote Social Line of Business File Versioning Inventory Legal Entertainment Hard Drives Search Engine Smart Office Battery SaaS Automobile Search How to Regulation Relocation Benefits Customer Service Techology Best Practice Computer Accessories Mobile Office Two Factor Authentication Troubleshooting Humor Domains Smart Technology CrashOverride Printers Internet Exlporer Scalability Vendor Management Company Culture Assessment User Error Bluetooth Emergency Public Speaking Hybrid Cloud Shadow IT Hosted Solution Experience Webinar Presentation Managing Stress Television Hiring/Firing Lithium-ion battery Net Neutrality Content Fun Internet exploMicrosoft Tech Support Music IT solutions Quick Tips 5G Public Computer IBM Politics Worker Safety Files ISP Audiobook Utility Computing Loyalty Advertising Twitter Wearable Technology Office Transportation Colocation Customer Relationship Management Video Games Rootkit Competition History Employer Employee Relationship IP Address Books

Mobile? Grab this Article!

QR-Code dieser Seite