IT departments and risk management teams are often unsure what to do with highly sensitive or data-laden equipment. Especially when that hardware is old and has no...
Read moreTips for Reducing Risk of a Data Breach from Unwanted IT Equipment
Oftentimes, unwanted IT equipment is in a limbo, interim stage between usage and refresh or replacement. How can you minimize the risk of a data breach and potential...
Read moreHow to Select the Right Asset Disposition Vendor
The success of a lifecycle management program for your company’s IT equipment is dependent on the rigor of your end-to-end process including the selection of an asset...
Read moreWhat’s in the Closet? What to do with old computers and hard drives.
Flip on the lights of any storage room and you will be shocked by the amount of printers and computers that have live data on them and deemed “out of commission”. ...
Read moreQ&A: Electronic Recycling & Disposal
The practice of electronic waste (E-waste), referring to unwanted or damaged technology devices, is one of the fastest growing waste problems in the United States. We...
Read moreThe Growing Need for BYOD (Bring Your Own Device) IT Security.
In this new era of BYOD usage, 80% of employee BYOD activity goes unmanaged by corporate IT security programs. The reason? Current IT security technologies were not...
Read more