When people think of cybersecurity, they often picture firewalls, passwords, and phishing emails. But behind many high-profile data breaches and disruptions lies an equally critical issue: how old hardware is handled once it’s no longer in use.
Let’s take a look at five recent incidents that serve as powerful reminders that secure IT asset disposition (ITAD) is not a nice-to-have—it’s essential.
1. ATM Jackpotting Hits the Midwest
Hackers recently exploited vulnerabilities in ATMs across Minnesota to trigger “jackpotting” attacks, causing machines to dispense cash on command. While this involves software manipulation, the risk is higher when outdated or unsecured devices aren’t properly decommissioned or maintained.
2. Healthcare Systems Under Siege
Central Kentucky Radiology and Central Maine Healthcare both suffered breaches that affected hundreds of thousands of patients. Old equipment and unsecured data repositories are common contributors to such breaches, especially when outdated systems are forgotten during tech upgrades.
3. Mower County Ransomware
A Minnesota county government faced ransomware attacks that impacted operations and exposed sensitive data. Government entities often have long equipment lifecycles, and attackers know these environments may harbor unprotected legacy systems.
4. Hawaiian Airlines & Aflac Breaches
While details are limited, both organizations reported “cybersecurity incidents” affecting consumer data. Whether it was from an unpatched vulnerability or data left on improperly disposed equipment, it’s a reminder that hardware-level security matters.
5. Lake Risevatnet Dam Attack
Yes, even infrastructure can be a target. Hackers reportedly accessed a dam system and fully opened its valves. While not confirmed to be related to disposed devices, it demonstrates that physical systems tied to digital controls are vulnerable if not properly maintained and decommissioned.
The Connection to ITAD
Outdated or retired devices—from copiers and laptops to networking gear—can contain sensitive data, credentials, or access points. If not securely destroyed or wiped, they can be exploited long after leaving your building.
ITAD Isn’t Just Recycling
Secure IT asset disposition involves:
- Verifiable data destruction (shredding or NIST-compliant wiping)
- Chain-of-custody documentation
- Environmental compliance for e-waste disposal
- Risk mitigation and compliance support
How SEAM Can Help
SEAM works with banks, healthcare systems, government agencies, and businesses across the region to ensure their old IT equipment doesn’t become tomorrow’s headline. Whether you’re retiring servers, medical devices, or network equipment, our certified ITAD process ensures secure, trackable, and compliant end-of-life handling.
Protect your data. Protect your reputation. Dispose of your hardware the right way. Contact us to help.
Levi Hentges is the Vice President / Development at SEAM. He helps clients build and manage their IT Asset Disposition (ITAD) programs to comply with legal, corporate and environmental requirements surrounding their technology devices; including asset recovery and resale, data destruction and secure electronics recycling.