Cyber Security Tip: Don’t just throw out old computers or devices

Cyber Security Tip: Don’t just throw out old computers or devices

Mar 19, 2024

Getting rid of old computers or servers? Did you know that the components used in technology equipment are not landfill-safe? On top of the environmental hazards, unprotected e-waste typically contains a lot of confidential and private information in the form of saved passwords, Internet history and files left on the retired computer or server.

As a first prevention step, find a local recycling facility where e-waste can be safely disposed of. And make sure to take the following #1 security precaution before you haul it off: remove and destroy the hard drives. A drill and hammer usually do the trick just fine. Alternatively, many companies that shred paper documents will also destroy your hard drives.

We were recently contacted by an IT director who was desperate to find out if there was a way to remotely wipe hard drives after he found three of his company’s old computers on eBay. He found out the hard way: do not allow the recycling company to “destroy” the drive for you.

We offer free e-waste recycling services to our clients! Just let us know and we’ll pick up your old hardware and make sure it’s properly recycled.

Don’t forget other e-waste such as mobile phones, copy machines and any other device that ever touched your company data. Give serious thought to what data is on any device before you recycle it.

Have questions about cyber security or some other IT-related issues? Book Now to book a quick, 15-minute session, or call 480-999-5468 to speak to someone now.

Related Posts

Cyber Security Tip: POP QUIZ: You’re hacked…what do you do?

Cyber Security Tip: POP QUIZ: You’re hacked…what do you do?

IT Security Tip #40:

Think fast: what’s the first thing you do after realizing you just replied to the e-mail from the Nigerian prince wanting to give you a sum of $34 million? Okay, you most likely didn’t reply to that…but let’s suppose you suddenly realize your machine or device has been compromised and you’re staring at a ransom note. Now what?

0 Comments