Articles

The Most Overlooked Part of Your Data Security

HBR

Organizations constantly replace outdated computers. This rush to upgrade, however, creates a challenge: large numbers of excess electronics must be managed and disposed of properly.
— Harvard Business Review

pdf_icon

PDF of complete article.

Back To Top

How to Prevent Employee Theft of Your Retired IT Equipment

Law.com

Companies spend large sums of money creating firewalls and encryption to protect sensitive business data, so why do companies treat retired equipment so carelessly?
— Law.com

Back To Top

Fake Recyclers Counterfeit Parts and Software

usnews

Fake recyclers hold collecting events under the pretense of saving the environment, and then they’ll ship these computers to developing countries.
— U.S. News & World Report

Back To Top

Wiping Decommissioned IT Assets Should Be a Must

HelpNetSecurity

Retire-IT looked at tracking data from 1072 corporate disposal projects encompassing 233 different companies. Organizations ignore lost/stolen assets. 4 out of 5 ITAD projects missing least one asset.
— Help Net Security

Back To Top

How Dumpsters Cause Data Breaches

Security issues relating to IT asset disposal is not just an IT problem – it’s an issue of governance, risk and compliance.
— Security Magazine

Back To Top

ITAD Chain of Custody Part 1

What has more value, an armored bank truck, or a van delivering old computers to a disposal vendor? An armored truck may hold millions of dollars. An old computer on the other hand, if lost, may mean millions in liability.
— The ITAM Review
pdf_icon

PDF of complete article.

Back To Top

ITAD Chain of Custody Part 2 Case Studies

In his previous article Kyle explored the value of process in IT Asset Disposal – in this article Kyle explores some real life scenarios to illustrate chain-of-custody challenges.
— The ITAM Review
pdf_icon

PDF of complete article.

Back To Top

Consider ITAD a Security Incident

Organizations that focus on privacy take a serious look at all areas of potential vulnerability. One area of unappreciated vulnerability is the process of IT asset disposition (ITAD).

— International Association of Information Technology Asset Managers (IAITAM)
pdf_icon
PDF of complete article.

Back To Top

Does Your Business Have a Security Plan?

Another area that doesn’t get a lot of attention is the disposal of computers. Once these devices have outlived their usefulness, they are often thought of as fair game for employees. Organizations need a reverse procurement process.
— Business News Daily

Back To Top

Have Environmental Regulations Helped or Hurt?

The experts’ consensus is that environmental regulations in the US have had a lot of successes and few failures, although some aspects could still be improved. The biggest risk with electronics recycling relates to data security and employees stealing equipment, and that happens before the recyclers are involved.
— The Guardian Express

Back To Top

Medical Office Today – Steps to Prevent Back-Office Fraud

Employee theft of retired computer equipment is a common situation that creates massive liability for unknowing medical practices. Frequently retired computers contain private data that can create massive liability for a medical practice when it is lost, stolen or inadvertently disclosed.
— Medical Office Today

Back To Top

FAQ: How do I protect my small business from cyber attacks?

When an organization retires unwanted technology, it faces risks associated with data security and environmental compliance. Threats from trusted insiders and negligent vendors increase the challenge. Companies should be aware of the data security threats that come with updating IT.
— NerdWallet

Back To Top

The US ITAD market space

The ITAD industry in the US has matured rapidly in the past few years. Media coverage has increased public awareness of the environmental problems and privacy concerns when discarded equipment is discovered in third world countries, or when confidential data falls into the wrong hands. When evaluating sufficiency of their ITAD policies and procedures, organization must be mindful of potential administrative fines, remediation expenses, and the possibility of costly privacy class action litigation.
— Asset Disposal & Information Security Alliance
pdf_icon
PDF of complete article.

Back To Top

[divider scroll_text=”Return to the Top”]

Interviews:


Listen to Eric Dye, the host of the Entrepreneur Podcast Network, interview Retire-IT CEO Kyle Marks about proper IT asset disposal. EPN is an Internet radio program with over 17,000 international listeners.
To listen, click here or on the image above.

Back To Top

TechTalk
Clear Channel’s Talk With Craig Peterson is rated as the top tech show nationwide — more than 9,500,000 podcast downloads. Listen to Craig interview Retire-IT CEO Kyle Marks about proper IT asset disposal.

To listen, click here or on the image above.

Click here to download the podcast in iTunes.

Back To Top

GreenAirMinute

 

Listen to the host of CBS News Radio’s “The Green Air Minute,” Rich Awn, interview Retire-IT CEO Kyle Marks about proper IT asset disposal.

To listen, click here or on the image above.

Back To Top

 

 

 


W4WN.com is the world’s #1 ranked women’s internet radio station with over 4.3 million monthly listeners. Holly Campbell, the host of W4WN.com’s “Holly’s Digital Business Hour,” interviews Retire-IT CEO Kyle Marks about proper IT asset disposal.

To listen, click here or on the image above.

Back To Top

keyboard_arrow_up