Archives for August, 2018

  1. As recently as a couple of decades ago, IT asset disposition (ITAD) wasn’t something the average business had to contend with. These days, advances in technology have put the issue front and center. The vast majority of companies now rely on some form of computer technology, from POS systems all the way up to vast and complex databases.

  2. Doing away with computer equipment is not the same as upgrading office furnishings or purchasing new office supplies. You can’t just throw out the old stuff when you replace it with newer models. This is because computer hardware contains sensitive data that could compromise the privacy of customers, employees, partners, and more if it falls into the wrong hands.

  3. The US Department of Health and Human Services recently issued guidance on how to properly dispose of electronic devices to prevent data breaches. Learn how your Midwest healthcare organization can implement their recommendations.

  4. Plastics from recycled electronics have always been a difficult material to manage. With export markets quickly disappearing, electronics processors are now struggling to find responsible solutions.

  5. Modern business owners certainly understand the importance of cyber security and the potential harm from data breaches. While attacks on mega-corporations make headlines, there are also tons of small and midsize business hacks that nobody hears about.

  6. As fast as technology advances these days, companies often find themselves struggling to keep up. A solid strategy involves choosing the right hardware and software solutions that are going to last for years to come with appropriate integration and updates, and even seeking custom solutions. However, you are going to reach a point where you really need to upgrade to new hardware in order to remain relevant, maintain efficiency, and serve your clientele.

  7. There are known risks to storing data in digital formats. If your firewall isn’t robust, your password protections are weak, you’ve decided to forego encryption, and so on, you place yourself at risk of data breach, identity theft, and damage to your customers and your company.