It’s easy for vintage enthusiasts to wax lyrical about the “vintage” chunky, boxy TVs of yesteryear – until they remember the picture quality. Despite daily use, no-one wanted the enormous..
Electronic devices have become an integral part of how we live, more so, our small, portable, and smart mobile phones that we carry everywhere we go. In fact, there were..
We use computers for everything: work, shopping, accounting, communication and even gaming. Rapid advances in computer technology guarantee that there will always be a better and faster device just around..
Regardless of the kind of hard drive you use – magnetic hard drive disks or solid-state drives – knowing how to destroy a hard drive correctly is critical for the..
Did you know that, on average, each American household contains 24 electronic devices and gadgets? And with technology developing at an unprecedented rate and our lust for gadgets and electronics..
Computers, laptops, tablets, cell phones, e-readers: Americans can’t get enough of technology. Technology is developing at an almost unbelievable rate, and we are eager to jump on each new device..
An IT asset management plan dictates how IT assets are to be handled throughout their useful life and mandates the procedures that should be put in place to properly sanitize..
What a difference two decades can make! It was less than twenty years ago that computers were sometimes a luxury and sometimes a novelty. Schools often had one computer per..
The Cost and Prevalence of Medical Data Breaches Research based on data from 2009 until 2016 suggests that the cost of medical data breaches has reached $363 per record, according..
Most people have a dead battery or two in their junk drawers and they probably don’t know how to dispose of batteries. Batteries are an important and reliable daily source..
You should never just dispose of electronics in the trash. Electronic waste from computers and peripheral equipment such as CPUs, laptops, PDAs and networking systems contain potentially harmful components such..
According to the US Environmental Protection Agency, Americans produce over 200 million tons of trash annually. Out of this, 75% is recyclable yet we only recycle, through recycling programs, about..
The past few years have transformed the IT landscape and organizations now are faced with the challenge of dealing with mounting e-waste. As a result, the services of IT asset..
Over one-third of the organizations in the US lack active policies for the destruction of confidential data and information. And according to a study by the Ponemon Institute, more than..
Today’s business environment is faster than ever – and the use of effective business intelligence software to manage huge amounts of data gathered has never been as important as now...
What is ITAD? IT Asset Disposition, or ITAD, is the process of recycling and disposing of old electronic equipment and other IT resources in an organization using practices that are..
With banks handling so much data, maintaining information security via a data destruction policy is quickly becoming an integral part of their operations. Financial and banking organizations are bound by..
Data breach is quickly becoming a headache for us while we take giant leaps in terms of technology, which is why data shredding is a rising star in the war..
Ethical data destruction has become an important tool that effectively safeguards your organization against data breaches originating from storage devices. But what if the company shredding your data misuses the information?..
Information Technology (IT) is the driver of the new world and data is its currency, but there’s a number of data destruction myths that may be leaving your business open..
As companies create new proprietary technologies, what happens to the obsolete electronic devices such as defective toys, proprietary technology, defective gadgets, cell phones, and more? How can you be sure..
Faced with the need to destroy tape media? In most organizations, backup tapes contain confidential information that can cause security risk when not properly destroyed. If not, at some point..
With so much of the data controlled by doctors and hospitals on electronic devices, including mobile devices, desktop computers, servers, and in the cloud, the security of that data is..
Computers and laptops are becoming obsolete faster than ever before. As we move more of our personal data onto computers, criminals are using the content left over on our old..