The Preventable Breach

Privacy breaches can grab worldwide headlines when hackers access millions of customer records. It can be an endeavor for experts to determine the source and a technical challenge to prevent future attacks.

On the other hand, when an employee takes 55 retired laptops over a six-year period, the source of the breach is not sophisticated, nor is it difficult to prevent. The theft of retired equipment is completely preventable.

Businesses spend an estimated $68 billion per year on IT security measures including firewalls, network monitoring, encryption, and end-point protection. In comparison, organizations spend almost nothing on measures to protect and track retired equipment.

Today, most organizations outsource ITAD to electronics recyclers, often for free. Businesses simply assume that disposal vendors will responsibly recycle unwanted equipment and destroy any sensitive data. What could go wrong with that approach? A lot.

Without simple security measures, trusted insiders can take retired assets any time before the hand-off to a disposal vendor. As former IT employee of North Country Hospital recently explained, “there’s a pile with discarded laptops, you grab the one with the least scratches on it.”

Coincidentally, that same former employee is being accused of demanding monetary compensation to return a retired laptop to the hospital.

While it is impossible to expect an organization to prevent every privacy breach, especially ones that stem from sophisticated cyber-attacks, it is not unreasonable to expect an organization to safeguard retired IT equipment.

IT asset disposition is the preventable breach. There are seven steps every organization should take in order to prevent a breach from retired equipment.

Recent Posts

  • In The News

Understanding the Difference Between ITAD Consultants and Service Providers

Traditional ITAD vendors can undervalue equipment & lack transparency. Learn how ITAD consultants offer a…

2 weeks ago
  • In The News

From Niche to Necessity: The Future of IT Asset Disposition Safeguards

You can’t solve a problem you can’t discuss. This book uses cartoons to expose the…

3 weeks ago
  • In The News

Where the IT Lifecycle Ends

You can’t solve a problem you can’t discuss. This book uses cartoons to expose the…

1 month ago
  • In The News

Why Hardware Asset Management is Harder Than Accounting

Struggling to keep track of your laptops? Turns out, hardware management is like herding cats…

2 months ago
  • In The News

Why Recusal is Crucial for Responsible Asset Disposition

IT asset managers must stop juggling both lifecycle and disposal! It's a recipe for data…

3 months ago
  • In The News

The IT Asset Houdini Act

In the world of IT asset management, assets disappear like magic. But when it's time…

3 months ago

This website uses cookies.