253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Upgrading Your Technology? Be Careful of What You Do with the Old

Upgrading Your Technology? Be Careful of What You Do with the Old

Take a moment to look around you and take in the amount of technology surrounding you. How often do you think this technology is replaced, and what do you think happens to the old tech? There needs to be more thought and effort put into its disposal than just throwing out a hard drive that no longer seems to function. Unfortunately, the amount of e-waste shows that may be the preferred method of disposal.

A discarded device follows the same path as the rest of the contents of your trash bin. Either your discarded piece of technology will find itself in a landfill, or left somewhere in a third-world country. Whichever option, the device is now a complete waste, as the materials used to construct it are now little more than bits of precious metals, glass that has almost certainly been broken by this point, and other bits and pieces.

The statistics surrounding e-waste can be pretty staggering. For example:

  • 2016 alone saw 45 million tons of electronics thrown away.
  • Only 20 percent of e-waste makes it to be documented and recycled.
  • The raw materials in devices that are thrown away value in at about $55 billion, smartphones contributing $9 billion to that total.
  • 76 percent of all e-waste goes unaccounted for.

Of course, as technology advances, there is going to be more and more e-waste produced. However, there is another issue regarding e-waste that your business could be especially affected by if your e-waste isn’t handled properly, and that’s your business’ data security.

Security Concerns
If your devices are discarded with information still on them, that data is at severe risk of being compromised, especially since the devices are no longer in your possession.

What if you got a new smartphone, and just toss out the new one? Sure, it’s dead now, but all it would take for any data it held to be compromised is someone with a charger cable and a basic knowledge of how to break into a phone. Now, any accounts that you used on the device, both business and personal, are at the mercy of your phone’s new owner. They could access your company’s data in the cloud with a discarded external hard drive.

To avoid this, not only do you need to dispose of your old technology properly, you need to also make sure that any information on them is properly wiped and/or destroyed before you do so. While you could destroy the device yourself, the better option is to reach out to the professionals at Graemouse Technologies. We know how to properly see that your devices are destroyed without the risk of leftover data causing your company grief. We’ll even help you to recycle your device, so there’s less of a chance of it landing in a dump somewhere.

To learn more about proper device disposal, give us a call at 253.777.0763.

Perpetrators of Three Major Cyber Crimes Have Pled...
Tip of the Week: Filters and Labels Help Organize ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Network Identity Theft Software Network Security Computers Computer Care webinar Upgrade Advertising Internet of Things Operating System eWaste Google Word IBM Cortana Tip of the week OneNote Two-factor Authentication Evernote Office Windows 10s Unsupported Software Trending Chrome Staff Workers Small Business Managed Service Provider Netflix IT Consultant Router Artificial Intelligence Outsourced IT Business Computing Internet exploMicrosoft Business Intelligence Website IT Plan Managed IT Services Marketing Communication Internet Alert Windows Business Continuity Data Save Money Hardware IT Services Cybersecurity Google Drive IT Management Botnet Remote Work Recovery Data Protection Windows 10 Telecommuting Server Gadgets Knowledge Saving Money Skype Leadership CES Flexibility Microsoft Networking History Smartphones Files Patch Management Mobile Device Management Online Shopping User Tips Keyboard BDR Productivity Redundancy Spam Blocking IT Support Telephone Systems Settings Best Practices Google Apps Conferencing VoIP Passwords Humor PDF Public Cloud Password Health Law Enforcement Browser Excel Bandwidth Quick Tips Employer-Employee Relationship Online Amazon Security Google Docs Business Management Physical Security Meetings Private Cloud Millennials Office 365 Technology Email Android Solid State Drive Avoiding Downtime Data Security Telephony FCC App Recycling Blockchain Communications Managed IT Services Amazon Web Services Legal Work/Life Balance Comparison Disaster Recovery Privacy Social Media Computer Frequently Asked Questions Hackers Start Menu Tip of the Week Managed IT Data loss Network Congestion Data Breach Relocation Phishing Cybercrime Electronic Medical Records Data Storage Windows Server 2008 Criminal Cloud Hybrid Cloud Ransomware How To BYOD Net Neutrality Bring Your Own Device Innovation Supercomputer Microsoft Office Voice over Internet Protocol Smartphone Malware Government Infrastructure Collaboration Update Efficiency Business Data Backup Data Recovery Workforce Content Management Remote Monitoring Hosted Solutions Backup Cloud Computing Windows 10 Wi-Fi User Error Tools Wireless Charging Travel Virtualization FENG Digital Signature Gmail Automation Windows 7 Downtime Title II Root Cause Analysis Money Data Management Sync Emails Vulnerability Facebook Multi-Factor Security Mobile Devices Software Tips Charger Social Engineering Spam

Newsletter Sign Up