Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

How to Safely and Securely Dispose of an Old Computer

How long have you been working on the same computer? Depending on your answer, it may be time to replace it with a new model. That’s simple enough (especially with our help), but the question remains: what are you supposed to do with the old one?

Believe it or not, there is a very wrong way to dispose of your old business technology that could easily create far greater problems than even continuing to use it might cause. To help you avoid these circumstances, we wanted to share the safe version of this process with you… starting with the one that might circumvent the biggest impact upon your business.

Data Concerns

There is a major difference between disposing of the equipment you’ve been using and disposing of the equipment you’ve been using (along with all the important data that might still be on it). It is FAR better to go with the first option, which means you will need to back up any data saved on the device before definitively removing it.

Why take the time to remove it?

Consider, for a moment, the kind of data that could potentially be hidden away in the storage of this to-be-discarded device. Once your technology is no longer in your possession during the disposal process (as we will discuss later), what guarantee do you have that the equipment will be sufficiently secured? As soon as your equipment is out of your hands, you have no way to confirm that the data left on it won’t be extracted and copied before disposal.

However, really protecting your data is going to take more than just pressing the delete button. Instead, you need to acquire a special software that both deletes and overwrites your data, stymying any attempts to recover it. After completing that process, your security measures should continue:

  • Encrypt the drive
  • Deauthorize any accounts associated with that device
  • Wipe all browsing history
  • Uninstall all programs and delete all files on the device

Finally, once all that is done, perform a factory reset just for safe measure. Alternatively, you could also remove your hard drive to keep it as an archive (making sure that it is completely secure) or physically destroy the component itself.

If you choose to go the destruction route, make sure that the hard drive is good and destroyed when you’re done. You’d be amazed what data has been extracted from before. 

Yes, You Still Need to Do This If the Device Won’t Turn On

Here’s the thing: a dead device isn’t the same thing as a device that’s been wiped of data. In fact, if your computer will not turn on, there’s a very good chance that the data on it is still safe and sound. This is because the kind of issues that typically “kill” your device may not affect the hard drive.

This can be good, or bad, depending on the circumstances. If you want your data, you know that you can still get it with the help of someone who knows what they are doing. The problem is, many hackers will also know what they are doing, and could extract your data if they got their hands on your old hardware.

Speaking of your old hardware…

Properly Disposing of the Equipment

Even if you are positive that your data is good and gone, you can’t just toss the computer to the curb with the rest of the trash. Computers and other electronics contain some materials (including heavy metals) that can severely damage the environment. Therefore, just having it sent to a landfill can cause some significant problems down the line.

It is far better to recycle any of your old, unwanted hardware. Unfortunately, even that can be trickier than it sounds. You must be careful about picking a recycling company to handle it, as some will just ship your discarded device to a developing nation. Once it’s there, children will expose themselves to the hazardous contents we just mentioned while trying to extract the materials in a computer that have some value. Once they are done, all those hazardous materials are left to seep into their groundwater, causing even more damage.

Make sure you find a recycling company that abides by a code of ethics in its operations.

Another alternative you might consider is to donate your old system once the hard drive is fully wiped or replaced with a fresh one. There are many charitable organizations that would welcome a computer but can’t spare the resources to procure one.

For assistance with properly recycling your old business technology, reach out to Direct Technology Group! Discuss it with us directly by calling 954-739-4700.

Data Lake or Data Warehouse... Which One’s for You...
Tip of the Week: Effectively Training Your Staff
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 07 April 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Google Efficiency Malware Hackers Network Security Microsoft Productivity Data Innovation Software Smartphones User Tips Backup Miscellaneous Hardware Email Business Computer Mobile Devices Workplace Tips Hosted Solutions Android Internet communications Communication Productivity Ransomware Smartphone Business Management Cybersecurity Outsourced IT Windows Small Business Windows 10 VoIP Upgrade IT Support Browser Social Media Managed IT Services Tech Term Network Microsoft Office Users Mobile Device Passwords Windows 10 Bandwidth Employer-Employee Relationship Save Money Business Continuity Holiday Collaboration IT Services Apps Managed IT Services Office Automation Facebook Chrome Data Backup Internet of Things Quick Tips Gadgets Marketing Cloud Computing Gmail Data Recovery Wi-Fi Disaster Recovery IT Support Router Mobile Device Management Alert Applications Networking Password Server Information Wireless Apple Phishing Managed Service Access Control Remote Computing Settings Hacking Virtualization Retail Business Intelligence Mobility App Managed Service Provider Computers Office Tips VPN Health BYOD Application Saving Money iPhone Data Management Website Operating System Going Green Blockchain Patch Management Office 365 Laptop Physical Security BDR Remote Monitoring Recovery Excel Cybercrime Government Law Enforcement Analytics Maintenance Compliance Big Data Data Breach Lithium-ion battery Artificial Intelligence Battery Virus Spam Telephone Systems Social Engineering Bring Your Own Device Value Biometrics History Mouse Twitter Humor Word Mobile Computing Google Drive Safety Workers VoIP Paperless Office Entertainment Environment Politics Managed IT Service WiFi Healthcare Company Culture Scam Cortana Telephony Smart Technology User Error Data Security G Suite Best Practice Virtual Reality Files Shortcut Tablet Data storage Medical IT PowerPoint Connectivity End of Support Voice over Internet Protocol Current Events Mobile Office Social Network Human Resources Search Batteries Telephone System Cleaning Hosted Solution Wireless Charging Dark Web DDoS Robot Tech Support IT solutions Hard Drives Printer Customer Relationship Management Tip of the week Payment Cards Shadow IT Risk Management Printer Server Customer Service Virtual Assistant Internet Exlporer Windows 7 Managing Stress Data Protection HIPAA Fax Server How To Streaming Media Hybrid Cloud The Internet of Things Tech Terms Remote Monitoring and Management Two-factor Authentication Sports RAM Cost Management Net Neutrality Information Technology Employee-Employer Relationship Business Technology Vulnerability eWaste Processor YouTube Memes Science Spyware Travel Alerts Electronic Health Records Machine Learning Worker Paper Display Bluetooth Mobile Security Update File Management NarrowBand IT Windows 8 HP Live Streaming Work/Life Balance Downtime Employees Telecommute Reporting Sales Managed Services Provider Voice over IP Ink Avoiding Downtime Multi-Factor Security Wearable Technology Benchmarks USB Social e-waste Outlook Wireless Technology E-Commerce Hosted Desktop Document Management Cables Automobile WhatsApp People Solid State Drive Bloatware Data loss Knowledge Profitability Vendor eCommerce Running Cable Recycling Chromecast Payment Firewall Digital News Uninterrupted Power Supply Comparison disposal Copy Monitor Hard Disk Drive Consultant Entrepreneur Staff GDPR Computer Accessories Access Eliminating Downtime Online Shopping Downloads Internet exploMicrosoft Social Networking instant Messaging Profiles Tablets Edge Antivirus Techology Printers Specifications Paste Meetings Reputation Video Best Available Websites Storage Cameras Wireless Internet Distribution Trends Google Maps Advertising Bitcoin HaaS Vulnerabilities Computer Repair Amazon Education Conferencing Spotify Customer OneNote Dongle Error Help Desk Fleet Management Lead Generation A.I. Distributed Denial of Service Private Cloud Flexibility Hiring/Firing Budget Cryptocurrency IT Service WIndows 7 Memory IT budget Plug-In Unified Threat Management Personal Information Remote Support Content Filtering Database Cabling Remote Control Windows Server 2008 R2 Touchscreen Certification Multi-Factor Authentication Movies Windows Media Player Botnet Public Cloud Threats Legal Staffing Touchpad Mobile IT Management Proactive IT SaaS User Tip Tactics Spam Blocking Taskbar Programming Technology Tips Microsoft Office 365 Training Holidays WannaCry Unified Communications Managed IT Scams Time Management Remote File Sharing Telecommuting Internet Explorer Windows XP Email Management SharePoint Relocation National Security Backup and Disaster Recovery Authentication Security Cameras Virtual Private Network Hard Drive Encryption PDF Project Management Video Games Chrome OS Phone System Analyitcs Network Attached Storage Analysis User Security Millennials Threat Updates User SSD Authorization Wearables Co-Managed IT Hacker Processors Microsoft Teams Licensing Notifications Insurance Gadget Black Market Server Management Printing Webcam Inventory Troubleshooting