The Absolute IT Asset Disposal Blog

The 5 Biggest Data Risks To Be Aware Of In 2020

 

Data security is a more significant issue in IT than ever before, with the prevalence and cost of privacy failures rising rapidly. According to one study, data breaches have risen by over 54% in the past year, while a report by IBM sets the average cost of a major breach at over £3 million.

Read More

Data Protection & IT Asset Disposal: How To Comply With The Law

IT managers who are arranging for the disposal of unwanted or out-of-date hardware, including data storage devices, face a variety of challenges. From the safe deletion of sensitive data to the removal of bulky equipment, practical problems abound, which is why employing an asset disposal company such as Absolute ITAD to manage the operation, can ensure the process is efficient and within the...

Read More

Is It Safe To Resell Your Used IT Assets?

As your business grows, you upgrade your IT hardware to assets that provide more storage capacity and better performance. A company can get rid of these used IT assets by reselling them or donating them to charity. However, if not done correctly, reselling IT assets can risk a catastrophic data breach, even if you believe the hard drive is clean.

Read More

What Is A Denial-Of-Service Attack And How Do You Prevent Them?

A Denial-of-Service (DoS) attack is an intentional and malicious targeted strike against a website or server that renders the target inaccessible to its users. People trying to get onto the website or online service will find that they cannot do so. The affected users might be clients, e-commerce customers, or staff. DoS attacks frequently target the servers of well-known companies and...

Read More

Why You Can’t Afford To Cut Corners With IT Asset Disposal

The old saying that ‘if it looks too good to be true, it probably is’ applies to many things, but especially to free services that offer to erase or sanitise your old hard drives. Blancco – the IT security software manufacturer – highlighted this problem in a 2016 study. Blancco bought 200 used hard drives from eBay and Craiglist. On testing the drives the study found that 67% of the drives...

Read More

What Items Does WEEE Apply To?

All electrical items featuring the 'Crossed Bin' logo are covered by the WEEE (Waste Electrical and Electronic Equipment Directive) Regulations (2003/2007). These indicate devices and peripherals that cannot legally be sent to landfill under UK and EU law. Instead of being dumped, WEEE items must be sent to a professional recycling and salvage company, so that working or valuable parts and...

Read More

Why Do All Of My Staff Need To Understand The Risks Posed By Malware?

If you run a business with one or more internet-enabled devices, you need a dedicated strategy in place to ensure your staff are aware of the risks posed by malicious downloads and hacks. While not all hacks are preventable, a savvy workforce lowers the risk that your company will fall victim to many of the common ploys cybercriminals use.

 

Read More

Don't Trust Unsecured Wi-Fi! (Or, Five Things Not To Do When Using A Public Connection)

Public Wi-Fi is a great tool for checking your email, social media, and browsing the web when you're out and about. However, there are risks attached – especially when accessing the connection for business use.

Read More

What Is WEEE Waste?

WEEE waste is any type of electronic waste that falls under the Waste Electrical and Electronic Equipment Directive (2003/2007) for the safe disposal and recycling of used electronic goods.

Read More

How Can I Know If My Computer Or Mobile Has Been Infected By Malware?

 

Get Expert Advice Today

 

It can be harder than you might think to determine whether a company device is suffering from a malware infestation. Malicious apps are deliberately designed to hide in plain sight or run in the background of an operating system (OS) to evade detection. However, with the right knowledge they can be rooted out, disabled, and deleted for good. Here's a guide to quick...

Read More
6 Hidden Dangers Of Free IT Recycling

Subscribe to Email Updates

New call-to-action

Follow Us

Most recent post