The Absolute IT Asset Disposal Blog

10 Small Password Security Tips That Can Make All the Difference

As the building blocks of online security in the Information Age, passwords serve as the first - and sometimes the only - line of defence against cyber-crime. Companies and their staff rely on them for both online and offline security, and nothing can match the peace of mind that a strong password can offer.

Read More

What Happens To My Computer Hardware Once It Is Collected?

Keeping on top of IT upgrades frequently means generating an abundance of obsolete tech. Most companies know that to avoid data theft and environmental damage, this needs to be professionally recycled. However, few know what happens to computer hardware once it is collected. As you wave goodbye to your ancient tech, it starts the next phase of its life by giving back to the environment. Here’s...

Read More

What Are The Main Cyber Security Risks For Your Business?

For as long as businesses have existed, they have fallen under the greedy gaze of criminals. Due to its rapid and largely uncontrolled growth, cyberspace has emerged as a 21st century reincarnation of the Wild West, where cybercriminals are frequently one step ahead of the law. Most of the criminal strategies fall under the heading of malware: “software that is specifically designed to...

Read More

3 Consequences Of Not Disposing Of IT Assets Securely

Have you ever wondered about the consequences of not disposing of your assets securely? Whether you’re investing in a digital transformation, downsizing, or simply having a clear out, getting rid of devices that are filled with sensitive data and hazardous substances can be nerve-wracking.

Read More

4 Top Tips To Securely Transferring Your IT Assets To A New Location

Relocating to new premises is always a tense experience. Concern over IT safety is a major contributor to the headache. From service disruption to the risk of misplacing a data-filled asset, relocation often involves the heady mix of change and chaos.

Read More

Why Your Customer's Privacy Is At Risk When Recycling Old IT Assets

We live in a world of other people’s information. All manner of devices contain data in memory chips and SIM cards as well as hard disks and solid state drives. Network appliances can contain all kinds of information and settings about a company’s infrastructure configuration, client data, and network contacts. Mobile devices are just smaller computers that have extensive memory capacity. Some...

Read More

What Are The Best Ways To Rank Cyber Security Risks

According to the World Economic Forum’s Global Risks Report (2018), over 21,000 surveyed business leaders from 140 countries now rank cyber-crime at the top of their list of risks. The key to managing this threat, we are told, is thorough cyber-security risk assessment. If you’d like to learn how to rank your cyber-security risks accurately and efficiently, read on.

Read More

Best Practices For Reusing Corporate Laptops

It seems like a pretty safe activity, doesn’t it? After all, we are all colleagues, and a simple reimage and redeploy of a Windows laptop - deleting the old user’s profile and creating a new one - and it’s job done. But is it? The truth about how much data remains after a standard reimage and redeploy is sobering. Personal information and company data linger in the background, and simple...

Read More

4 Steps You Can Take To Avoid A Ransomware Attack In 2019

Ransomware is now the most common type of malware, involved in almost half of all incidents reported to cybersecurity companies. It used to be mainly a problem on Windows desktops and laptops but now criminals target Android devices and – increasingly – business systems. That means bigger ransom demands and extortion rewards for the criminals.

Read More

What To Do If You Suspect A Data Breach

The steps needed to recover from a data breach are just as critical as the measures you need to take against them. Let’s assume you have all the usual safeguards in place: an up-to-date firewall and anti-virus, good data security policies, safe asset disposal/recycling procedures. What do you do when, despite this, cyber attackers can find ways to access privileged information? When you...

Read More
6 Hidden Dangers Of Free IT Recycling

Subscribe to Email Updates

Guide to mobile data sanitisation - small CTA

Follow Us

Most recent post