The Absolute IT Asset Disposal Blog

Can I Reassign A Furloughed Employee’s Laptop To Another Team Member?

The Government’s furlough scheme, which has recently been extended until October 2020, has supported many employees who have been unable to work during the Covid-19 crisis.

Unlike those workers who have continued to carry out their employment at home, furloughed staff have not needed to use business IT assets, such as laptops, desktop computers, and mobile devices, many of which now lie unused...

Read More

One Person’s Rubbish is a Hacker’s Treasure - The Dangers Of Unsafe Hardware Disposal

 

Once a piece of IT equipment is broken, finished, or obsolete, no-one’s going to bother to go to the trouble of using it again for anything, right? Not necessarily...

Many inexperienced IT administrators, business owners, and equipment officers fall into the trap of thinking that once a machine is classed as ‘used’ or unwanted, it’s effectively useless to the company and everyone else.

Read More

Checklist: How To Secure Your New Workplace Computer

When you get a new computer, the first thing to take care of is cybersecurity. Prevention is better than cure; just like with your own health, it's better to stop issues arising in the first place than to have to firefight later. Let's run through some simple tips to help keep your business and customer data safe.

Read More

Why You Shouldn’t Trust Electronic Resellers For Your Business’ Unwanted Hardware

From time to time, most businesses upgrade their IT hardware to keep pace with their competitors and the ever-changing face of technology. Replacing even a small number of computers, tablets, servers, and storage devices can be costly, so it’s unsurprising that many businesses seek to save money by reselling redundant electronic assets. There are numerous electronic resellers who will promise...

Read More

The Advantages Of HDD Shredding For Data Security

 

HDD shredding is a foolproof method for permanently destroying sensitive data on redundant storage devices from desktop PCs, to laptops and file servers. Instead of simply cleaning the devices, which in some cases can risk the illicit recovery of data by third parties, physical HDD shredding ensures that the hard drive is destroyed by shredding it into tiny fragments, meaning there is no...

Read More

The 5 Most Serious Data Security Risks & How To Avoid Them

As hacking becomes an increasing danger for businesses, secure data management is becoming a primary concern. Here are the five leading data security risks and how to avoid them:

Read More

The 5 Biggest Data Risks To Be Aware Of In 2020

 

Data security is a more significant issue in IT than ever before, with the prevalence and cost of privacy failures rising rapidly. According to one study, data breaches have risen by over 54% in the past year, while a report by IBM sets the average cost of a major breach at over £3 million.

Read More

Data Protection & IT Asset Disposal: How To Comply With The Law

IT managers who are arranging for the disposal of unwanted or out-of-date hardware, including data storage devices, face a variety of challenges. From the safe deletion of sensitive data to the removal of bulky equipment, practical problems abound, which is why employing an asset disposal company such as Absolute ITAD to manage the operation, can ensure the process is efficient and within the...

Read More

Is It Safe To Resell Your Used IT Assets?

As your business grows, you upgrade your IT hardware to assets that provide more storage capacity and better performance. A company can get rid of these used IT assets by reselling them or donating them to charity. However, if not done correctly, reselling IT assets can risk a catastrophic data breach, even if you believe the hard drive is clean.

Read More

What Is A Denial-Of-Service Attack And How Do You Prevent Them?

A Denial-of-Service (DoS) attack is an intentional and malicious targeted strike against a website or server that renders the target inaccessible to its users. People trying to get onto the website or online service will find that they cannot do so. The affected users might be clients, e-commerce customers, or staff. DoS attacks frequently target the servers of well-known companies and...

Read More
6 Hidden Dangers Of Free IT Recycling

Subscribe to Email Updates

Guide to mobile data sanitisation - small CTA

Follow Us

Most recent post