(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at NTConnections. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at (703) 288-9767.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Hosted Solutions Malware Internet Google Mobile Devices Efficiency VoIP Business IT Support Email Miscellaneous IT Services Managed Service Provider Innovation Server Disaster Recovery Business Continuity Workplace Tips Network Data Windows Upgrade Network Security Software Hardware Business Management Communication Computer Save Money Saving Money Mobile Device Management Virtualization Smartphones Android Browser Smartphone Microsoft Office User Tips Managed IT Services Holiday communications Data Backup Outsourced IT WiFi Windows 10 BYOD Small Business Computers Social Media Remote Monitoring Cybercrime Operating System Hacking Chrome Mobile Computing Alert Apple Proactive IT Avoiding Downtime Big Data Application IT Solutions Managed IT Services Quick Tips Ransomware Office Information Technology Budget Social Engineering Collaboration Employer-Employee Relationship Passwords Marketing Cloud Computing The Internet of Things Data Recovery Automation Gadgets Recovery Telephone Systems Mobility Health Bring Your Own Device VPN BDR Going Green Remote Computing spam Bandwidth iPhone Compliance Cybersecurity App Wireless Technology User Error Gmail Private Cloud How To Managed IT Save Time Firewall Vendor Management Two-factor Authentication Internet of Things Retail Memory Windows 10 Search Antivirus Vulnerability Data Security Networking Office Tips Analytics Router Lithium-ion battery Artificial Intelligence Business Intelligence PowerPoint Website Excel Phone System Mouse Content Filtering Money Downtime Redundancy IT Support History Tablet Document Management Office 365 Risk Management Data Management Value Workers Printer Internet Exlporer Mobile Office Customer Relationship Management Business Owner Data storage Biometrics OneNote Identity Theft Current Events Best Available eWaste People Maintenance Programming Hard Drives Credit Cards Network Congestion Work/Life Balance Trending Facebook Intranet Physical Security DDoS Humor Robot Statistics Public Cloud Data Storage Environment Google Drive Phishing Word Human Resources Outlook HIPAA SaaS Training Safety Flexibility Apps IT Consultant Government IT Management Meetings Administration Law Enforcement HaaS Fax Server Solid State Drive Saving Time IT Plan Black Market Entertainment Running Cable CES Online Currency Unsupported Software Skype Unified Threat Management Streaming Media Managing Stress Instant Messaging Cables Sync Colocation Shortcut Content Management Electronic Medical Records Update Windows 8 Remote Work Software Tips LinkedIn SharePoint Virus Encryption Unified Communications Hosted Solution Telephony Computing Infrastructure Print Server Sports Blockchain Bluetooth Google Docs Debate Legal Tablets Monitor Computer Accessories Notifications Theft Start Menu End of Support Audit YouTube Staff USB Voice over Internet Protocol Mobile Device Net Neutrality HBO Video Surveillance Computer Repair Reputation Wearable Technology Cameras Consultant Social Cortana Mobile Internet exploMicrosoft Screen Mirroring NarrowBand Root Cause Analysis Multi-Factor Security Education Fraud Frequently Asked Questions Customers Printer Server Best Practice Social Networking Google Apps Patch Management Professional Services Advertising Cast Chromecast Data loss Worker Commute Lifestyle Piracy Analyitcs Amazon Touchscreen Tip of the week User Infrastructure Scam Tools Laptop Settings Charger Data Protection Licensing Amazon Web Services Windows Server 2008 Samsung Distributed Denial of Service Virtual Desktop Password Manager Twitter Hybrid Cloud Touchpad IT service Computer Care Comparison Virtual Reality Online Shopping Windows 7 Crowdfunding Relocation Uninterrupted Power Supply Spam Blocking Business Mangement Botnet Data Warehousing Domains Specifications Bloatware Evernote Keyboard Regulations IaaS Cleaning Customer Service Recycling Travel Millennials Windows Media Player Entrepreneur Wireless Charging Servers Tech Support Computer Fan Criminal Workforce Hiring/Firing Applications Company Culture Hacker WIndows 7 Cost Management Fiber-Optic Flash Files Windows 8.1 Update Shadow IT FENG Productivity Software as a Service Password Telecommuting Wi-Fi Wireless Science Troubleshooting Techology Public Computer Employer Employee Relationship Automobile Data Breach Emails Books CrashOverride Users IBM Webinar Emergency Digital Signature Worker Content Supercomputer IT solutions Rootkit Video Games Audiobook Knowledge Netflix Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television