How to securely recycle enterprise computers

Disposing of devices in a sustainable manner, while also safeguarding sensitive data, is a dual challenge that many organizations face today.
If the old computer was not encrypted, someone can simply go dumpster diving and retrieve it to gain access to any local files and data stored on the device.
Organizations have suffered data breaches due to improper disposal of computers, leading to unauthorized data access and all the financial and legal ramifications that come with that.
Even if an organization takes a more thoughtful approach and reuses or resells old devices, secure data disposal is not a guarantee.
In 2022, Morgan Stanley had to pay $60 million to settle a data security lawsuit after reselling unencrypted equipment that still contained customer data.
Organizations must adopt secure data disposal methods to follow data protection laws, such as GDPR and HIPAA. At the same time, many must adopt sustainable IT asset disposition methods to follow the e-waste laws that several governments have in place.
To balance these needs and avoid environmental and security risks, IT should learn how to securely recycle enterprise computers.
Regardless of the proper use of cloud-based tools, most Windows computers still store data locally, such as Outlook PST files, which can contain months of email, contacts and calendar information - data that should not fall into the wrong hands.
Formatting a disk doesn't delete the data on the disk; it only removes the pointers to the data.
As long as IT isn't doing a low-level format or using software that overwrites the old data, there is a chance that the data is still easily accessible through recovery software.
Software-based methods can overwrite all data on the storage devices and ensure no trace of the original data remains.
It's important to use tools that meet recognized standards, such as NIST Special Publication 800-88, for data erasure.
In cases where data wiping or degaussing isn't feasible, the next option is physical destruction, such as shredding the hard drives.
For federal data, compliance with National Security Agency data destruction requirements might be necessary.
In addition to completing data destruction IT should confirm that the device is at its end of life and make sure that its parts don't become e-waste.
After properly erasing all the sensitive data, admins can decide on the most practical way to get rid of the hardware.
Before a computer is either repurposed or recycled, ensure that all valuable data is backed up securely, preferably in a cloud-based service.
Regardless of how an organization decides to retire its hardware, it's crucial to perform secure data erasure on the devices.
Provide guidelines to employees for backing up their data safely and ensuring that they do not store any data locally on the device.
Properly recycling enterprise computers is a comprehensive process that involves employing secure data deletion, analyzing the potential for reuse and working with responsible recycling programs.


This Cyber News was published on www.techtarget.com. Publication date: Thu, 11 Jan 2024 17:43:04 +0000


Cyber News related to How to securely recycle enterprise computers

Threat landscape for industrial automation systems. H2 2023 - In the second half of 2023, the percentage of ICS computers on which malicious objects were blocked decreased by 2.1 pp to 31.9%. Percentage of ICS computers on which malicious objects were blocked, by half year. In H2 2023, building automation once ...
3 months ago Securelist.com
Threat landscape for industrial automation systems, Q1 2024 - In the first quarter of 2024, the percentage of ICS computers on which malicious objects were blocked decreased by 0.3 pp from the previous quarter to 24.4%. Compared to the first quarter of 2023, the percentage decreased by 1.3 pp. Percentage of ICS ...
1 month ago Securelist.com
How to securely recycle enterprise computers - Disposing of devices in a sustainable manner, while also safeguarding sensitive data, is a dual challenge that many organizations face today. If the old computer was not encrypted, someone can simply go dumpster diving and retrieve it to gain access ...
5 months ago Techtarget.com
CVE-2020-8023 - A acceptance of Extraneous Untrusted Data With Trusted Data vulnerability in the start script of openldap2 of SUSE Enterprise Storage 5, SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Point of ...
3 years ago
Safeguard Your Network in a Post-Quantum World - There is an imminent threat to existing cryptography with the advent of quantum computers. A quantum computer works with qubits, which can exist in multiple states simultaneously, based on the quantum mechanical principle of superposition. Thus, a ...
4 months ago Feedpress.me
CVE-2020-8022 - A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise ...
3 years ago
CVE-2019-3695 - A Improper Control of Generation of Code vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Development Tools ...
4 years ago
CVE-2019-3696 - A Improper Limitation of a Pathname to a Restricted Directory vulnerability in the packaging of pcp of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module ...
4 years ago
The Top Four Things Tech Manufacturers can do to Bolster the Cybersecurity of Target-Rich, Cyber-Poor Organizations - Schools, municipalities, and non-profit organizations contribute to flourishing communities by supporting civic life and democratic processes. In many cases, they need someone with training and expertise to implement mitigations and securely ...
1 month ago Cisa.gov
CVE-2019-18904 - A Uncontrolled Resource Consumption vulnerability in rmt of SUSE Linux Enterprise High Performance Computing 15-ESPOS, SUSE Linux Enterprise High Performance Computing 15-LTSS, SUSE Linux Enterprise Module for Public Cloud 15-SP1, SUSE Linux ...
4 years ago
Quantum computing: The data security conundrum - One of the biggest challenges of digital technology today is around security systems and data. While this has proven successful, advancements in quantum computing - which utilises quantum mechanics to solve complex problems faster than conventional ...
4 months ago Itsecurityguru.org
CVE-2020-8019 - A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of syslog-ng of SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Module for Legacy Software 12, SUSE Linux Enterprise Point ...
3 years ago
CVE-2021-28828 - The Administration GUI component of TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - ...
3 years ago
CVE-2021-28829 - The Administration GUI component of TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - ...
3 years ago
CVE-2021-28827 - The Administration GUI component of TIBCO Software Inc.'s TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition, TIBCO Administrator - Enterprise Edition Distribution for TIBCO Silver Fabric, TIBCO Administrator - ...
3 years ago
Splunk Patches High-Severity Vulnerabilities in Enterprise Product - Splunk on Monday announced patches for 16 vulnerabilities in Splunk Enterprise and Cloud Platform, including six high-severity bugs. Three of the high-severity issues are remote code execution flaws that require authentication for successful ...
2 days ago Packetstormsecurity.com
Splunk Patches High-Severity Vulnerabilities in Enterprise Product - Splunk on Monday announced patches for 16 vulnerabilities in Splunk Enterprise and Cloud Platform, including six high-severity bugs. Three of the high-severity issues are remote code execution flaws that require authentication for successful ...
2 days ago Securityweek.com
CVE-2000-0121 - The Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by creating a subdirectory with the victim's SID in the recycler directory, aka the "Recycle Bin Creation" vulnerability. ...
5 years ago
CVE-2022-28552 - Cscms 4.1 is vulnerable to SQL Injection. Log into the background, open the song module, create a new song, delete it to the recycle bin, and SQL injection security problems will occur when emptying the recycle bin. ...
2 years ago
PurpleFox malware infects thousands of computers in Ukraine - The Computer Emergency Response Team in Ukraine is warning about a PurpleFox malware campaign that has infected at least 2,000 computers in the country. The exact impact of this widespread infection and whether it has affected state organizations or ...
5 months ago Bleepingcomputer.com
It's time to bolster defenses for an AI / Quantum Future - The rapid advances we are seeing in emerging technologies like AI, ML and quantum computing will have a devastating impact on organizations not prepared and who have not considered updating existing modes of asymmetric data encryption. Quantum is ...
4 months ago Cybersecurity-insiders.com
Simplify DNS Policy Management With New Umbrella Tagging APIs - This blog post will show you how you can automate DNS policy management with Tags.To streamline DNS policy management for roaming computers, categorize them using tags. By assigning a standard tag to a collection of roaming computers, they can be ...
3 months ago Feedpress.me
Non-mobile malware statistics, Q1 2024 - More than 83,000 users experienced ransomware attacks, with 20% of all victims published on ransomware gangs' DLSs hit by LockBit. In Q1, Kaspersky solutions protected 83,270 unique users from ransomware Trojan attacks. Number of unique users ...
1 month ago Securelist.com
Quantum computing will enable a safer, more secure world - Today's media narrative around quantum computing's role in cybersecurity is overwhelmingly negative, because quantum computers will render today's encryption standards redundant, leaving much of our data at risk of being decoded. First, it's ...
6 months ago Cybersecurity-insiders.com
Cybersecurity for Remote Workers: Best Practices - In the current era of remote work, organizations worldwide face a critical concern: ensuring the cybersecurity of their remote workers. To address this issue, businesses must establish a robust cybersecurity framework that incorporates best practices ...
5 months ago Securityzap.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)