April 8, 2019

Why ITAD Is Essential To Properly Managing E-waste

Information Technology and Electronics Asset Disposition (ITAD) is an important step in protecting data on outdated electronic devices. Technology changes constantly and outgrows its usefulness. Rather than have tons of obsolete or outdated electronics end up in landfills, electronics recycling and e-waste companies like ERI Direct recycle or give new life to this e-waste.Why Recycle […]

Read More

April 2, 2019

5 Unconventional Electronics Protected by HIPAA

By 2006, every small or large healthcare company – doctors to insurance companies – had to come into compliance with the Health Insurance Portability and Accountability Act of 1996 (HIPAA). One of the important functions of HIPAA is to protect all of a patient’s sensitive health information.To do this, patients have to sign paperwork allowing […]

Read More

March 26, 2019

The World’s Worst Electronic Waste Offenders

Stop and think about countries you would name as having the biggest problem with waste. A 2018 Forbes article brought attention to the fact that China, Indonesia, the Philippines, Thailand, and Vietnam are responsible for the highest amounts of plastic waste getting dumped in the ocean. The Citarum River in Indonesia is known as being […]

Read More

March 18, 2019

Why The Circular Economy Model Is The Only Solution For E-waste

Here are some staggering facts. The United States Environmental Protection Agency (EPA) believes more than 2.3 million tons of electronics were tossed in 2009. Only a quarter of that 2.3 tons was actually recycled. Most ended up in trash bags where it was hauled to landfills. According to the Global E-waste Monitor, about 44.7 million […]

Read More

March 7, 2019

POS Upgrades: What Retail Stores Should Do With Outdated Equipment

Is retail the leader in data breaches? People mistakenly think it is. The truth is financial institutions, healthcare, and government agencies are where most breaches occur. However, retail is in the top 10. The problems are numerous. Retailers may not realize they need powerful firewalls and point-to-point encryption when transmitting credit and debit card details.Think […]

Read More

February 18, 2019

Wiping vs. Degaussing vs. Shredding – What’s the Difference?

When a laptop, smartphone, printer, or other device is past its prime, what happens to it? Tossing electronics into the trash is no longer accepted. States have laws that require electronics recycling. What if those devices store personal information like passwords, account numbers, and other sensitive data. You don’t want that information falling into the […]

Read More

February 4, 2019

Who is Responsible When a Data Breach Occurs?

The Identity Theft Resource Center revealed 1,244 breaches occurred during 2018. While that was lower than the breaches that occurred in 2017, the number of records exposed in those breaches was over 446.5 million. That’s more than double the exposures from 2017.The breaches in 2018 hit the business sector the hardest. Marriott International saw the […]

Read More

January 22, 2019

Why ITAD Is the Most Overlooked Security Issue

The International Data Corporation (IDC) estimates that companies will spend over $100 billion on cybersecurity initiatives by the year 2020. The researchers who came to this conclusion believe that companies will be willing to invest more in cybersecurity than ever before due to the increase in data breach incidents over the last several years. Researchers […]

Read More