If it’s time to replace your IT equipment, then it’s time to double check that your data security policy contains a secure chain of custody and an electronic data...
Read moreTips for Reducing Risk of a Data Breach from Unwanted IT Equipment
Oftentimes, unwanted IT equipment is in a limbo, interim stage between usage and refresh or replacement. How can you minimize the risk of a data breach and potential...
Read moreHow to Select the Right Asset Disposition Vendor
The success of a lifecycle management program for your company’s IT equipment is dependent on the rigor of your end-to-end process including the selection of an asset...
Read moreDiscarded Computers, Devices and Systems Still Contain Lots of Personal and Confidential Information
The number of businesses that unwittingly dispose of computers with confidential data left on them remains remarkably high, despite the long-understood risks of not...
Read more