The Absolute IT Asset Disposal Blog

4 Common IT Recycling Mistakes to Avoid

At Absolute IT, we're deeply experienced when it comes to the safe, clean, and secure disposal of all types of IT assets. However, there are some vital steps that every user and administrator can take before they pass their old and unwanted IT equipment to us for recycling. These simple tips will help you avoid data breaches, prevent the spread of toxic pollution, and stop you scrapping...

Read More

Why Does An IT Asset Disposal Business Need To Be ADISA Certified?

ADISA offers accreditation to businesses who deal with IT asset disposal (ITAD) and approves products involved in data sanitisation. Its services are dynamic enough to deal with an increasingly regulated sector, conducting reassessments every year. The latest set of standards accredits ITAD providers who deliver consistent security through independently verified tools and the latest best...

Read More

What Exactly Is Ransomware & Should I Be Concerned?

Ransomware is any malicious program that locks you out of your own system or files and restores access in return for a ransom payment. It relies on high-end encryption to work, scrambling the order of data chunks stored in your hard drive through a complex algorithm known as a cypher. Businesses of all sizes are vulnerable to ransomware attack if precautions are not taken to safeguard...

Read More

Why Has The Demand For Cybersecurity Grown?

Cybersecurity is currently a booming sector. With more of our economy coming online every day, professionals such as systems analysts, Dev-Ops engineers, and security managers are in high demand. Encryption, anti-virus, and firewalls are now ubiquitous, rather than luxury insurance policies. But why now, of all times? Here are some of the major reasons.

Read More

How Can You Trust Your IT Recycler Is Erasing your Data?

A recent ADISA study revealed that many companies are still ignoring their GDPR compliance duties. With EU-wide penalties for non-compliance reaching the £10 million mark, this makes the IT recycling market potentially catastrophic for any business without a thorough understanding of data protection legislation. The only way to stay safe is with the help of the sole enterprise offering...

Read More

Does The IT Recycling Company You Use Ensure GDPR Compliance?

The stiff new General Data Protection Regulation is demanding on your recycling practices, and failing to comply comes with severe penalties no business can afford. Your passwords, accounts, and files can be abused in many different ways, and only a GDPR-compliant IT asset disposal service can assure you of absolute safety. Compliance isn’t easy to assess, though. The GDPR is complex and...

Read More

12 Data Security Tips For Using The Cloud Safely

If your company holds or accesses any data whatsoever remotely in 2019, the chances are that you're using a cloud server. Using the cloud, however, often means that you're putting your eggs in someone else's basket. How can you keep your data as safe as possible when it's not on your personal, local machines? Even if it is, how can you limit the risks involved? Here are some quick and easy...

Read More

4 Data Security Risks That Nobody Will Tell You About

If you're an IT manager, a system administrator, or you work in tech support, you're probably well aware of all the basic tips and tricks when it comes to online and offline security. It would be utterly patronising to talk you through how passwords, firewalls, anti-virus, and data leaks work yet again.

Read More

Why Use An ADISA Accredited IT Asset Disposal Company?

Every industry has one or more professional accreditations. For IT recycling businesses, the only accreditation that matters is certification by the Asset Disposal & Information Security Alliance (ADISA). ADISA is an international professional body that establishes standards for service, quality control and secure data-handling for IT asset disposal companies.

Read More

What Exactly Is Personal Data?

One year (or thereabouts) since the implementation of the GDPR across the EU, it’s worth taking stock of what is covered and what constitutes personal data under the legislation.

Read More
6 Hidden Dangers Of Free IT Recycling

Subscribe to Email Updates

Guide to mobile data sanitisation - small CTA

Follow Us

Most recent post