window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at TaylorWorks. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at 407-478-6600.

Perpetrators of Three Major Cyber Crimes Have Pled...
Tip of the Week: Filters and Labels Help Organize ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Technology Cloud Best Practices Managed IT Services Network Security Privacy Business Computing Data Backup Email Hackers VoIP Malware Outsourced IT Data Recovery Hosted Solutions Mobile Devices Microsoft Tech Term Google Backup Data Software Cloud Computing Internet of Things Innovation Saving Money Business Continuity Cybersecurity Hardware Internet Efficiency Small Business Android IT Support BDR Disaster Recovery Communications IT Services Cybercrime Ransomware User Tips Smartphones Router Managed IT Services Artificial Intelligence Communication Applications Law Enforcement Gadgets Managed IT How To Network Business IT Support Mobile Device Management BYOD Two-factor Authentication Business Management Business Intelligence Collaboration Windows Phishing Avoiding Downtime Chrome Data Security Virtualization Browser Computers Smartphone Data Protection Productivity Money Spam Alert Telephone Systems Proactive IT Identity Theft Bandwidth Mobility Word Computer Social Engineering Document Management Passwords Connectivity Windows 10 Vulnerability Apps Compliance Productivity Remote Monitoring App Facebook Save Money IT Management Redundancy Office 365 Blockchain Analysis Social Media Comparison Unsupported Software Value Operating System Business Owner VPN Data Storage Holiday Infrastructure Education Bring Your Own Device Wi-Fi Update Mobile Device Servers Credit Cards Networking Work/Life Balance Workers File Sharing Employer-Employee Relationship Information CES Machine Learning Data loss Training Budget Firewall OneNote Microsoft Office Encryption Solid State Drive Content Management Flexibility Big Data Information Technology Password Private Cloud Data Breach Website Access Control Server Miscellaneous Paperless Office Upgrade Smart Tech IT Plan Spam Blocking Windows 7 Automation Authentication Outlook Cortana USB Remote Monitoring and Maintenance Computer Fan Wireless Human Resources Students Tools Electronic Medical Records IT Consultant Windows 10 Insurance Cryptocurrency Multi-Factor Security Remote Computing Telephone System eWaste Wireless Internet Telephony Online Shopping Government Managed Service Provider Content Filter Regulations End of Support Data Management Fiber-Optic Nanotechnology Frequently Asked Questions Specifications Recovery Line of Business FENG Staff Healthcare Root Cause Analysis Leadership Practices Safe Mode Software Tips Trending Keyboard Windows 10s Criminal Wire Skype Evernote Augmented Reality Accountants HVAC PDF Unified Threat Management Netflix Password Manager Storage Health Office Tips Botnet Cables Excel Millennials Technology Tips MSP Wireless Technology Digital Signature Electronic Health Records Meetings Hosted Computing Physical Security Lifestyle SaaS Sports Start Menu Wireless Charging HaaS Save Time The Internet of Things Enterprise Content Management Data Warehousing Google Drive Risk Management Cleaning Settings Marketing Hacker Business Mangement Flash Fraud Patch Management Current Events Travel Unified Communications Devices Tip of the week Workforce webinar Inventory Mobile Computing Workplace Tips Managed Service Audit Smart Office Mobile Knowledge IoT Password Management Google Docs Hard Drives Business Technology Computer Care Gmail Addiction Amazon Virtual Reality Scam Strategy YouTube Screen Mirroring Emails Users Theft Thought Leadership Windows Server 2008 Telecommuting Black Market Content Filtering Conferencing HBO Instant Messaging Proactive Professional Services Computing Infrastructure Hacking Network Congestion NIST Voice over Internet Protocol HIPAA Virtual Assistant Samsung Recycling Cache Sync Amazon Web Services Worker Commute Cast Software as a Service Public Cloud Legal Entertainment Charger Google Apps Streaming Media Remote Work Battery Downtime Automobile How to Television Internet Exlporer User Error Benefits Public Speaking Managing Stress Hybrid Cloud Best Practice IT solutions Worker Troubleshooting Public Computer Presentation Hiring/Firing Scalability Regulation Loyalty Lithium-ion battery Smart Technology Emergency Fun Internet exploMicrosoft Rootkit Tech Support Quick Tips Shadow IT Hosted Solution 5G Employer Employee Relationship IBM Experience Safety WiFi Twitter Files Advertising Content Office Remote Worker Computer Accessories Customer Relationship Management Music Competition Colocation Politics IP Address History Two Factor Authentication Search Audiobook Vendor Management Relocation Wiring CrashOverride Bluetooth Customer Service Wearable Technology Assessment Video Games Mobile Office Techology Transportation Domains Company Culture Webinar Humor Books

      Mobile? Grab this Article!

      QR-Code dieser Seite