The Dangers of Free IT Asset Disposal: Regulations

In a previous blog post, The Dangers of Free IT Asset Disposal: Data Security, we covered the threat posed to data security by free IT disposal. A data security breach is not the only risk you run when choosing a free IT disposal service provider however, as there are a number of legally binding industry regulations which also need to be observed when disposing of IT assets.

In part two of our ‘Dangers of Free IT Asset Disposal’ series we take a closer look at some of the regulations which govern the disposal of IT assets, and ask whether a free ITAD provider can be entrusted to comply with them.


How to Dispose of a Company Computer Securely

In today’s increasingly digital world, computers are indispensable to most companies. Not only do they allow employees to do their jobs, computers are also used to store sensitive data about the company, its employees and its clients. This means that when your company needs to dispose of their computers, either because of a malfunction, or a company upgrade, they must ensure that they do so securely. Currently, failure to do this could put you at risk of breaching the Data Protection Act 1998, which could have severe financial, legal and reputational consequences – and post May 2018 the GDPR (General Data Protection Regulation) which will replace the UK’s Data Protection Act, now that the UK government has confirmed the decision to leave the EU, will not change the adoption of this new regulation.


What should you look for in an ITAD?

The things to consider

Whether you are relocating, refreshing your IT estate or heading to the cloud – you will undoubtedly generate redundant IT hardware and as a result will need to ensure any residing data on that equipment is adequately erased.

When choosing to trust a new partner to manage your IT Assets and Confidential Data, you face a dilemma.  How do you know you’re making the right decision?  What criteria, industry guidance or performance measures do you work from, to ensure your decision is solid?


UK Security Breaches On The Rise – Are You Taking Action?

Unfortunately data security breaches are becoming more and more common which means that UK businesses are being forced to reevaluate their cyber security practises and data leak protection schemes. The issue of UK data security breaches is especially apparent given the fact that, in October, British Gas was the last of three companies (including Marks & Spencer and TalkTalk) to fall victim to a data breach in the space of a week. It is important that we learn from these breaches and that businesses do everything they can to avoid it happening to them.


How Much of Your Business Data is Google Tracking?

If you are like most business people, you probably utilise Google on a daily basis, using it to solve a variety of issues and answer queries. However, you may have never considered the types of data (and the amounts) that Google stores each time that you use it. While Google doesn’t make the extent of its data storage completely clear, it is not kept a secret: the data is there for you to access and remove if you wish. Here is a short list of the types of data that Google will store about your business, and how you are able to take control of the process.


Could The End of The Safe Harbour Agreement Impact Your Business Data?

The European Court of Justice has just ruled the Safe Harbour Agreement between the European and the United States invalid after Austrian law student, Max Schrems, brought it to their attention.

Schrems alerted the authorities following Edward Snowden’s revelations about the NSA’s mass surveillance operations. This decision will mean that changes are made in the way that personal data is transferred between companies, but what does it mean for individuals in Europe and the companies with which they regularly interact?


Microsoft Office Users Should Be Aware of the Dridex Virus

Until now, you may never have heard of Dridex, a new strain of malware. That might be about to change – this year alone they have managed to steal over £20,000 from UK bank accounts. Microsoft Office users should be alert, prepared and know how to stay safe from Dridex.

Dridex malware was designed to effectively eavesdrop on a victim’s computer use in order to yield personal information, such as usernames, passwords and secret answers. The ultimate aim? Breaking into bank accounts and stealing cash.


Prepare Your Business for the New EU Data Protection Regulations.

The EU is preparing to release new data protection regulation reforms. Whilst the exact details have not yet been released (and it will be a number of years before the new laws are actually put into practise), it is never too early to begin preparing your business for the changes. Preparing your business now means that you can ensure that you are completely on top of your current responsibilities before tackling any new ones that the regulations might require. Of course, the impact that these data protection changes might have on your company will vary from business to business, but here are just a few ways in which you can prepare:


Two Factor-Authentication: The Pros and Cons

It is critically important to protect sensitive data in business. However, in many organisations, not enough is being done to educate staff about how they can effectively protect their data beyond, creating a secure password. A myriad of other systems exist that can further your efforts to protect business data. Two-factor authentication, or 2FA is just one of those systems.

There are many benefits of two-factor authentication,, but do they actually outweigh the disadvantages of the processes involved in having them in place?


Using Big Data Applications Can Lead to Big Losses

It has never been more important that companies handle their Big Data applications effectively. A new report from Swiss cybersecurity firm BinaryEdge suggests that poorly configured applications using Big Data could be leaking more than one petabyte of sensitive data. This is worrying, because a large amount of this leaked data could be accessed without authentication.


To arrange a demonstration then please complete the form below and we will be in touch to arrange a convenient appointment:

Full Name

You Position

Company

Email

Telephone

Postcode

Please leave this field empty.

Protect My Data:

Complete the form below and we will be in touch.

Full Name

Email

Company

Telephone

Your Message

Please leave this field empty.

Request Information:

Complete the form below and we will be in touch.

Full Name

Email

Company

Telephone

Your Message

Please leave this field empty.