July 16, 2018

Study: U.S. Produces the Most E-Waste Per Person

Electronic waste, or e-waste, is a growing problem. People all over the world have contributed to this problem by throwing away electronic waste instead of recycling it responsibly. However, a new study reveals that the people in some countries contribute much more e-waste than others.An Overview of the Bureau of International Recycling (BIR) StudyThe Bureau […]

Read More

June 27, 2018

ITAD Plans For Small Businesses

Businesses of all sizes own and operate technological devices such as smartphones, tablets, and computers. These devices often contain sensitive data, such as customers’ names, credit card numbers, and other types of personally identifiable information. This information must be kept secure at all times–especially when the devices are no longer being used.If a device is […]

Read More

June 18, 2018

A Look Back at Cybercrime in the First Quarter of 2018

Cybercrime made headlines in 2017, and so far, it has shown no signs of slowing down in 2018 either. Less than half of the year has passed, and there have already been numerous cybercrime incidents that have affected countless businesses and consumers. Here’s a look at some of the biggest cybercrimes from the first quarter […]

Read More

June 11, 2018

The Mobile Workforce’s Impact on Your ITAD Plan

Numerous studies have shown that the majority of employees enjoy working remotely. Employees who work remotely can avoid lengthy commutes and find more of a work-life balance. But, they aren’t the only ones who benefit from this arrangement. Offering remote work helps companies retain their talent, improve employee satisfaction, and increase productivity.Remote work is beneficial […]

Read More

June 4, 2018

How to Change ITAD Vendors Without Putting Sensitive Data At Risk

A relationship between a client and vendor rarely lasts forever. These relationships often end when the vendor significantly increases their prices, discontinues certain services, relocates, or goes out of business. A relationship between a client and vendor can also be severed when the client is simply unsatisfied with the quality of the vendor’s services.In most […]

Read More

May 28, 2018

On-Site Data Destruction vs. Off-Site Data Destruction

Hiring an e-waste recycler to handle the destruction of data on unwanted or obsolete IT assets is a smart business decision. Reliable e-waste recyclers don’t simply erase the data off of these devices—they destroy it. Once the data has been destroyed, it can no longer be recreated, which means businesses won’t have to worry about […]

Read More

May 8, 2018

How to Prevent Employee Theft of Retired IT Assets

Many people assume that hackers are responsible for all data breaches, but that’s not the case. It’s true that hackers outside of the affected organization are often behind data breaches, however an employee within the organization can also be to blame for a breach.If an employee steals a retired IT asset, they are also stealing […]

Read More

April 30, 2018

IT Asset Disposition (ITAD) For Fortune 500 Companies

The Fortune 500 list is made up of some of the most successful corporations in the country. According to Fortune magazine, the companies on the most recent list have over $12 trillion in revenue and account for two-thirds of the U.S. GDP. These 500 companies also generate $890 billion in profits and hold $19 trillion […]

Read More

April 23, 2018

What Should Be Included in Data Breach Response Plans?

A data breach response plan is an outline of how a company will react to respond in the event their data is compromised. Having this type of plan in place is crucial because it ensures you are not forced to make important decisions while also dealing with the chaos of a data breach.But, a data […]

Read More