Is ITAD a Weak Link in Data Security?

Is ITAD a Weak Link in Data Security?

0 Comments

Is ITAD a Weak Link in Data Security?

Let’s face it, the amount of data currently being created on a day to day basis isn’t slowing down anytime in the near future.

With the increase in data comes newer, faster equipment with even more vast amounts of storage capacity.

Not only does that create a problem of what to do with the old assets, but more importantly how to keep them secure in the process.

A recent report from Experian revealed that nearly thirty percent of organizations don’t have plans in place to deal with data security threats.

You heard that right. According to their research that’s almost one third of businesses!

With cyber security threats from ransomware attacks to hard drives being sold online that still contain left behind data, how can any business not comprehend the risk that poorly managed data creates?

In more recent times, we’ve seen cyber security being prioritized as an area of great investment; especially with a majority of new businesses and startups in the data hosting sector.  

But ponder for a moment the amount of retired IT assets that end up in piles of scrap as new products are released on a continuous basis.

Whether it be an entire machine, such as laptops, desktops, and networking switches or individual components like SSDs, HDDs, memory, or tape cartridges, any small to mid-sized business produces a significant amount of physical data assets that need to be securely destroyed on a regular basis.

Unfortunately, end of life asset management and the secure destruction of data assets is often unnoticed.

An insufficient amount of businesses can guarantee or show proof that every measure possible was taken to prevent a data breach. 

Too few organizations can confidently state that all sensitive data was destroyed in a secure, accountable and socially responsible way.

When the General Data Protection Regulations (GDPR) came into legislature in May 2018, businesses began facing potential financial penalties if they didn’t comply with the data destruction guidelines.

 

data center energy efficiency

An organization that deal with or governs sensitive data should have an obligation to teach their staff about GDPR requirements and responsibilities. 

In order to stay ahead of the curve, businesses should also be making an effort to transform employee habbits when it comes to data asset destruction.

However, this can be a costly and timely process. Processes and policies in regards to asset and data disposition need to be communicated clearly to staff, resulting in the gradual education and behavioral change.

The decisions any organization has to make when choosing on an ITAD vendor are going depend on the size of the company and its equipment inventory.

Nevertheless, a business can adopt its own plan and strategy to fit its individual ITAD requirements, but the most important thing that must remain is taking an active part in the security of critical data.

Trusting the help of a reputable ITAD vendor makes a huge difference. There are countless security measures that a business may not think to take into account. 

A professional ITAD company will to ensure your data is properly secure from start to finish.

Since 1965, we’ve been in the business of helping organizations with all of their IT asset needs. 

With over 130 years combined industry experience, our equipment experts can assist in offloading old or retired hardware fast, easy, and even more importantly SECURELY.

When considering selling surplus IT equipment, visit one of our pages; We Buy Used IT EquipmentWe Buy Used MemoryWe Buy Used Hard Drives, We Buy Used Cisco, or We Buy Used Tape to get the highest market value and the greatest return on investment. 

Contact us today for a free quote and see why we’ve been trusted by businesses both large and small for over half a century.

ASCDI podcast

0 Comments

ASCDI Podcast: Meet DTC Computer Supplies, a company dedicated to the secondary market

New to the AscdiNatd, DTC Computer Supplies is a family owned company specializing in buying and selling IT equipment that offers a deep bench of experience in the industry, and especially in data storage products. In this podcast, Norm Hutton, Wholesale Purchasing and Sales with DTC, gives us a look at the new ASCDI member. Hutton discusses how DTC offers many services including quantity discounts, same day shipping, blind and double blind drop shipments, in-house labeling and initialization, free EDP Tri-Optic barcode labels with any tape purchase and a deep inventory of products. We learn about DTC’s exclusive Phoenix Rejuvenation Process. Hutton describes DTC’s used tape and IT equipment buyback programs.

Data Storage Security

0 Comments
data storage security
data storage security

As Breaches continue, DATA STORAGE and Fear of Adequate SECURITY are merging in the eyes of IT managers.

Over the years data storage security has become a concept centered around protecting data while warranting its availability to authorized personnel. 

Usually, data storage and data security are treated as individual subjects within the IT world, but that’s beginning to change faster than anyone thought it would.

A major reason for the recent merge in disciplines is the variety severity of security breaches routinely exposed by the media. 

As a result, IT managers in the healthcare, finance, and energy sectors have experienced a growing concern among their own.

A subdivision of the broader IT security field, data storage security specifically focuses on securing storage devices and the systems that operate those devices.

Securing data storage may as well be the last stand against an intrusion. 

However, it’s only an effective line of defense if data storage managers and IT administrators are willing to devote the time and effort needed to execute and initiate the existing storage security controls.

data security

In order to maintain reliable data storage security, IT administrators and mangers must carefully balance three important factors: confidentiality, integrity, and availability. 

This means keeping classified data away from unauthorized users, confirming reliability of the data on hand, and allowing access to accredited users within the organization. 

Administrators also need to be aware of the costs of storage security compared to the actual value of the data being safeguarded. 

It doesn’t make sense to have storage security systems in place that cost more than the data is even worth.

 

On the same note, managers should have storage security systems impenetrable to the point that it would cost potential hackers more money, time, and resources to breach them than the data is worth.

More than just recent data breaches, the array of liabilities administrators are progressively motivated to remove consist of shortage in encrypted systems and incomplete data destruction post deletion.

The setback associated with data destruction after data has been deleted can easily be solved with a SITAD organization.

Secure IT asset disposition firms are gaining popularity as they have gradually proven their effectiveness in helping businesses gain a higher return on their initial investment while keeping data secured during the destruction process.

There are also a number of simple steps that industry experts recommend for organizations that are considering employing storage security practices.

These steps include having specific data storage security policies as well as strong network and endpoint security.

Additionally, any organization that has concerns regarding their data storage security methods should invest in data tape backup.

The benefits of the tried and tested magnetic media storage are crucial when implementing effective storage and adequate backup systems and processes.  

tape seciurity

Data Storage Faceoff: Tape vs Disk vs Cloud

0 Comments
face off

Data Storage Faceoff: Tape vs Disk vs Cloud

In September 2010, Virgin Blue airline’s check-in and online booking systems went down for a period of 11 days, affecting around 50,000 passengers and 400 flights. Ultimately the downtime ended up costing the company over $20 million. So, what is the true cost of downtime you ask? Studies have shown that cost of partial data storage backup outages cost an average of $5600 per minute or $300 thousand dollars per hour! Depending on the industry, any single downtime can run into the millions of dollars of lost revenue. Just ask Virgin Blue.

Most businesses have (or should have) plans in place for emergency outages. Data backup procedures are a critical part of these emergency downtime plans. However, as the number of possible backup options multiplies with the introduction of new technologies it can be difficult to ensure you made the correct data backup decision.

Whether companies are looking to upgrade and retire aging infrastructure or are just preparing for the future, an assessment of options is needed. Welcome to the data storage face off- tape vs. disk vs. cloud backup.

Data Tape Storage Backuptape data storage

Back in the 1960s and 1970s, tape was the main way to store any backup data. Since then, it has evolved and grown with changes in technology and growing infrastructures for more than forty years. By deciding to implement or continue using tape will leave your organization with very few infrastructure improvements.

Tape is also the most affordable data storage option due to minimal infrastructure enhancements and the cost of tape itself. Usually, tape is an inexpensive alternative to both disk and cloud storage options; however, its dependent on the total amount and type of data your organization backs up.

Another major benefit of using tape as a main data storage method is the ability to take advantage multi-site storage. As with any organization’s emergency downtime initiative, it is ideal to ensure multi-site data storage. That way a disaster at one storage site doesn’t risk destroying all of the company’s proprietary data. Nevertheless, the multi-site tape storage method can be pricey once you factor in costs of secure tape transfer and storage in data centers at off site facilities. Although tapes have certainly been in existence the longest, like everything else they’re bound to evolve.

Hard Disk Storage Backuphard disk data storage

Disk-based backup such as hard drives, is vastly quicker and more consistent for data repair than tape backup. Instead of writing from disk to a tape, writing from a disk to a disk is purely a more effective method of data transfer.

In the same way, restoration from disk based storage is a fairly efficient process. Restoration allows the avoidance of retrieving, sequencing and then replicating tapes one at a time.

The biggest downside to disk-based storage backups is that they’re located in an on-site facility. For multi-location storage, a third-party is needed for off-site backup. If you don’t want to use an off-site storage provider, it can become extremely expensive to keep increasing disk space.

Cloud Storage Backupcloud data storage

Cloud-based backup refers to an online off-site back up through cloud enablement technologies. Organizations can typically store data with superior cost efficiency in a cloud, by eliminating the need to buy and refresh tapes or disks. Cloud backup is also a much less painstaking process, as data replication is done as a service.

Cloud backup normally consist of multi-site data storage. A local data copy can live in an on-site appliance like the SmartFrame, while it also replicates data to your off-site data storage provider. These applications and enablement technologies constantly run in the background of your IT processes, removing some manual IT processes.

Since cloud based back up is still a relatively new technology, there are some perceived security concerns around the cloud. Questions remain whether cloud backup will open their data to being hacked or even leaked from a third party. There are also concerns of accidental mixing of data with other customers existing in the same data center.

Decision Time

No matter which data backup method an organization chooses to implement, it will have its fair share of both benefits and drawbacks due to technology continuing to make advances in speed, efficiency and security. When the time is right for your business to install a data storage infrastructure or upgrade the infrastructure currently in place, let We Buy Used Tape do the work for you. Since 1965, We Buy Used Tape has been assisting IT professionals and their companies efficiently update their data back up systems. Used and surplus tape and disk storage can be repurposed; helping businesses increase initial return on investment while staying socially responsible. Contact one of our IT experts today for a hassle-free quote on your IT assets. Let us take care of your infrastructure update and security from start to finish.

 

we buy used tape logo

E-Waste Recycling: A Corporate How-To Guide

0 Comments
computers in trash

As we all know, e-waste continues to become an escalating issue around the world. Old and obsolete gadgets keep ending up in landfills as consumers demand new products and the life expectancy of electronics decreases. Trying to strategically manage electronic disposal with e-waste recycling can be a major burden for business owners in any industry. In the United States, businesses are regulated by state and federal laws concerning proper disposal of unwanted electronics. Hefty fines can be warranted if regulations are not followed.

E-Waste Recycling Options

That leaves businesses with four options when it comes to the electronic waste disposal: trash, recycle, sell, or donate.

Trash trash bin

In order for any organization to trash their obsolete goods, they must follow regulations governing hazardous waste or prove that the electronic equipment is not harmful. As much as this method is the least favorable, it is the most commonly used. Not only does it hurt the environment with toxins in the metals, but the ones throwing the electronics away don’t reap any benefits from it either.

Recyclerecycle bin

Recycling is the most socially responsible option available to business owners and gives any organization a sense of pride by doing their part to help the environment. We Buy Used IT Equipment can help you with your electronic recycling needs and ensure your data is 100% secure from the moment it leaves your facility. We offer chain of custody and certificate of data destruction to every customer upon request.

Sellgirl with cash money

Selling old and obsolete electronics is the most popular option among businesses. By selling old equipment, it gives companies a chance to recoup some of their original investment and balance budgets for the next year. Send We Buy Used IT Equipment a list of equipment you are looking to sell and we can make you an offer, helping you look like a hero to your organization.

Donatedonate now button

Many organizations chose to donate their unwanted electronics when it comes time to retire them. Not only do they reap the tax benefits of the donation, but it shows that they can socially responsible as well. We Buy Used IT Equipment offers donation assistance to anyone looking to contribute to a greater cause. Let us know which charity or nonprofit you would like to donate your goods to and we will take care of the rest.

Partner Checklist

When looking for a company to help dispose of electronic waste and IT assets, make sure you ask the following questions:

  • What measures do they take to ensure my data will be safe?
  • How are the toxic materials taken care of?
  • Are the reputable? How long have they been in business?

 

Why Choose We Buy Used IT Equipment?We Buy Used IT logo

The mishandling of electronic and IT asset disposal can result in a liability for any business. The organization that is having the e-waste disposed of, is ultimately responsible for every piece of data even after it is destroyed. Therefore, you want to choose a company that has a strong reputation of social responsibility and data security. We Buy Used IT Equipment has been a leader in the e-waste industry for over 50 years. Since 1965, we have made data security our top priority and have never had a data breach.

Electronic waste polluting our landfills won’t be ending any time soon. It is actually expected to grow 8% per year, forever. The EPA estimates that only 15-20% of e-waste is recycled, the rest of these electronics go directly into landfills. This is an epidemic that needs to end. Taking the time to properly examine your electronic waste options is the best way to begin. Choosing We Buy IT Equipment is the best way to end.