IT departments and risk management teams are often unsure what to do with highly sensitive or data-laden equipment. Especially when that hardware is old and has no...
Read moreElectronic Data Destruction 101: Chain of Custody
If it’s time to replace your IT equipment, then it’s time to double check that your data security policy contains a secure chain of custody and an electronic data...
Read moreTips for Reducing Risk of a Data Breach from Unwanted IT Equipment
Oftentimes, unwanted IT equipment is in a limbo, interim stage between usage and refresh or replacement. How can you minimize the risk of a data breach and potential...
Read moreHow to Select the Right Asset Disposition Vendor
The success of a lifecycle management program for your company’s IT equipment is dependent on the rigor of your end-to-end process including the selection of an asset...
Read more6 Essential Components of Your ITAD Solution
In the data destruction business, there are industry acronyms that we assume everyone understands: “ITAD”, Information Technology Asset Disposition, is one of the...
Read moreDiscarded Computers, Devices and Systems Still Contain Lots of Personal and Confidential Information
The number of businesses that unwittingly dispose of computers with confidential data left on them remains remarkably high, despite the long-understood risks of not...
Read moreQ&A: Electronic Recycling & Disposal
The practice of electronic waste (E-waste), referring to unwanted or damaged technology devices, is one of the fastest growing waste problems in the United States. We...
Read moreDoes Your Business Meet IT Security Compliance Standards?
In this fast-paced era of IT technology, data security and data breaches have come to the forefront of most business operations and costs. As technology keeps...
Read moreWarning! Discarding Old Computer Hard Drives Improperly could be a Matter of Life or Theft!
Sometimes, ignorance is bliss… except when it comes to discarding old computer hard drives. Contrary to popular belief, leaving data on old computers desitined...
Read moreSensitive End of Lease Hard Drive Data is Easy Prey for Digital Theft
If you thought that just putting secure network firewalls and anti-virus software in place was all you need to prevent data leakage… think again. While industry...
Read moreStage an IT Recycling Event… Good for Business, Good for the Community.
In this digital age, data theft and identity theft are on the minds of every major business and consumer in the country. Aside from shoring up your company’s IT and...
Read moreWhy an Approved E-Waste Recycling Program Can Give You Piece of Mind and Save You Money
If you are replacing IT equipment, de-commissioning a data center or planning a hard drive destruction program, there will be a lot of e-waste that needs to be...
Read more