ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at i-medIT. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at 630-549-6199.



No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Hackers Business Computing Microsoft Cloud Backup Innovation Email Small Business Smartphones Malware Software Hardware Android Business Cybercrime Efficiency Network Security Windows Mobile Devices Data How To Data Backup Ransomware VoIP Cybersecurity Cloud Computing Internet User Tips Business Continuity Managed IT Services Chrome Browser Social Engineering Productivity Mobile Device Management Computers Business Management Two-factor Authentication Telephone Systems Smartphone Operating System Social Media Internet of Things Computer Windows 10 App Data Recovery Money Communication Phishing Server Law Enforcement Automation Data Breach Spam Disaster Recovery Safety Outsourced IT Alert Data Security Collaboration Bring Your Own Device Managed IT Services Vulnerability Gadgets Upgrade Bandwidth Hosted Solutions Google Drive Wi-Fi Public Cloud BDR Apps Data Storage Office 365 Communications Data Protection Downtime Redundancy IT Management Avoiding Downtime Comparison Windows 10 OneNote IT Plan Recovery Quick Tips VPN Router Remote Monitoring Unsupported Software Government Business Intelligence Saving Money Update Network Internet Exlporer Spam Blocking Data storage BYOD CES Save Money Passwords Gmail Miscellaneous The Internet of Things Artificial Intelligence Virtualization Physical Security Word Private Cloud Screen Mirroring Budget Monitor Work/Life Balance Workers Managed IT Uninterrupted Power Supply Health Keyboard Going Green Human Resources Black Market Credit Cards Windows 7 Computer Fan Cast Microsoft Office NarrowBand Facebook Infrastructure Data Management Botnet Office Tips Multi-Factor Security Netflix Staff Hybrid Cloud Fraud Flash FENG Current Events Wireless Technology Password Manager Travel Cleaning Files Trending IT Support Sports PDF Amazon Knowledge Business Mangement Office Digital Signature Tech Support History Robot Amazon Web Services Sync Network Congestion Password Recycling Relocation Encryption Shadow IT Specifications Settings Laptop Online Shopping IT Consultant Productivity Chromecast eWaste Accountants User Error Touchpad Big Data Evernote Telephony Root Cause Analysis Software Tips Electronic Medical Records HaaS Criminal IT Services Millennials Charger Wireless Charging Reputation Skype DDoS Apple webinar Holiday End of Support Workforce Frequently Asked Questions Windows 10s Computer Care Meetings Networking Outlook Cortana Customer Start Menu iPhone Google Docs Conferencing Hiring/Firing Flexibility Content Management Samsung Internet exploMicrosoft Telecommuting Excel IBM Humor Patch Management YouTube Marketing Google Apps Hacking Tools Managed Service Provider Website HBO Emails Blockchain Value Advertising Remote Work Tip of the week Solid State Drive Data loss Supercomputer Automobile Scam Employer-Employee Relationship Voice over Internet Protocol Legal HIPAA Identity Theft Windows Server 2008 Audit Transportation IT solutions Bluetooth Best Practice SaaS Benefits Experience Mobile Device Firewall Music Worker Video Games Assessment Battery Wearable Technology Smart Technology Rootkit Scalability Television Education USB Information Technology Content Two Factor Authentication Training Workplace Tips Public Computer Computing Infrastructure Troubleshooting CrashOverride Audiobook Techology Vendor Management Instant Messaging Applications Remote Computing Entertainment Users Books Wireless WiFi Save Time IT Support Thank You Virtual Reality Emergency Congratulations Worker Commute Risk Management Employer Employee Relationship Mobility Search Webinar Politics Computer Accessories Loyalty How to