News & Updates

  • The Benefits (and Risks) of Going Paperless

    Although we’re far more comfortable using less paper in the format of newspaper and mailing letters, the workplace is still holding onto piles of paper. As of 2017, only 25% of organizations run a totally paper-free environment. Surprisingly, even with the introduction of technology, the usage of paper products has actually increased by 126% in […]

    Read More
  • Risks in Education: Disposing of Used Technology

    Today’s educational programs rely heavily on computers and other electronic devices. When IT equipment is ready to be retired, many institutions have limited budget and time to securely resell or properly recycle hundreds of systems on their own. What are the Risks? According to the Ponemon Institute’s “2017 Cost of Data Breach Study,” the average […]

    Read More
  • Data Centers and IT Asset Disposition

    A Data Center’s Turnover Challenge Data centers tend to have a shorter IT asset lifecycle due to the sheer volume of equipment in operation. A single data center could have hundreds of racks of hardware in constant need of monitoring and maintenance. Because of this, IT asset disposition (ITAD) is a continual challenge that must be […]

    Read More
  • What to Do Before Recycling Your Computer

    When it’s time to upgrade your used computer equipment, it’s important to dispose of the old devices legally and securely. Electronics from commercial generators are regulated as hazardous waste and must comply with Federal, State and Local landfill bans. Data security legislation also requires businesses and organizations to properly destroy data on obsolete devices. Computers, […]

    Read More
  • Data Security 101

    How Company Policy, ITAM, and ITAD Work Together to Keep You Secure. Data security is a real and expensive threat that exists for all industries that manipulate or store data. The 2017 Ponemon Institute Study cites data breaches now cost US businesses an average of $7 million. These breaches are often accompanied by regulatory actions and […]

    Read More
  • Are you Following the Right Destruction Standard?

    You may have heard of the Department of Defense 5220.22-M standard when it comes to hard drive shredding or wiping, but did you know this standard has actually become obsolete?  The Outdated DoD Standard. Although outdated, the DoD 5220.22-M standard is still referenced by many vendors and customers in the industry. Published by the National Industrial Security […]

    Read More
  • What is Revenue Sharing?

    When organizations are finished using their IT equipment, there is no reason to let it go to waste. By reselling used electronics, businesses are able to recover operating capital and reduce the total cost of ownership of their devices. Without internal resources or expertise to resell their own computer equipment, businesses might sell to the […]

    Read More
  • When is my Equipment Obsolete?

    Every few months, operating system updates are being rolled out. In the past, these updates were only released every 3-4 years and just a percentage of users would upgrade due to the cost and overall hassle. Today, these updates must be installed immediately to ensure data security. If an update or patch is missed, it […]

    Read More
  • Security Threats: Through the Back Door

    When technology expires it’s easy to shut down the device and think the risk is gone. The reality is, a new type of threat begins: Physical Security. Securing equipment against physical intruders seems like one of the easiest ways to protect company data. However, it’s usually one of the most overlooked steps at the disposal […]

    Read More