ITAD Archives - Compucom https://www.compucom.com/tag/itad/ Technology Driven. People Powered. Sat, 06 Apr 2024 02:22:34 +0000 en-US hourly 1 https://www.compucom.com/wp-content/uploads/2024/03/cropped-compucom-ico-32x32.png ITAD Archives - Compucom https://www.compucom.com/tag/itad/ 32 32 5 Ways to Improve Data Privacy in the Hybrid Workplace https://www.compucom.com/5-ways-to-improve-data-privacy-in-the-hybrid-workplace/ Tue, 23 Jan 2024 18:47:35 +0000 https://www.compucom.com/?p=5094 Man working on a laptopIn January 1981, the first legally binding international treaty dealing with privacy and data protection was signed. Since then, the extent of the world's digital interconnectivity has grown exponentially, with individuals and organizations accessing data from almost everywhere in the world. 

The post 5 Ways to Improve Data Privacy in the Hybrid Workplace appeared first on Compucom.

]]>
Emma Mak, Staff Writer

Emma Mak • Staff Writer

In January 1981, the first legally binding international treaty dealing with privacy and data protection was signed. Since then, the extent of the world’s digital interconnectivity has grown exponentially, with individuals and organizations accessing data from almost everywhere in the world. 

In honor of National Data Privacy Week, a celebration of that signing and a call for individuals and businesses to understand and respect privacy and data protection, here are five ways to improve data privacy in your hybrid workplace. 

1. Understand Your Risk Posture

A clear-eyed view of your company’s cybersecurity posture helps identify vulnerabilities and improvement opportunities. An assessment should include quantifying risks, finding gaps, and comparing your overall posture to industry and global standards.

2. Implement Zero-Trust Access 

  • Reducing risk to endpoints by ensuring that every access request is fully authenticated, authorized, and encrypted before granting access
  • Improving compliance and intellectual property protection by verifying each transaction and asserting least privilege access
  • Safeguarding identities with multifactor authentication (MFA) for all user identities accessing the environment, providing an additional layer of security from unauthorized access

Your security model should balance safeguards with good user experience to ensure productivity is maintained and users don’t consider circumventing systems just to get their work done. 

3. Protect Your Last Line of Defense — Your Users

Distributed workers may access your company’s data from any location and be required to manage multiple passwords. This makes users a useful “gateway” for bad actors to exploit, especially for companies using a weak security model that allows attackers to move laterally within the network. 

  • Multifactor Authentication (MFA)
  • Device Trust
  • Adaptive Access Policies
  • Single Sign-On 

4. Educate Employees on Phishing Scams

Implementing comprehensive security solutions goes a long way to protecting your company, but criminals are unrelenting in their pursuit of valuable data. Phishing scam strategies are always changing to get your employees to divulge sensitive information – and generative AI has been a big boost for attackers, enabling more sophisticated phishing campaigns.

5. Take Care of Old and Decommissioned Assets/Devices

How a Managed Services Provider (MSP) Can Help 

When looking for an MSP to help fortify your company’s privacy and data protection capabilities and keep up with the constant wave of ever-evolving cyber threats, look for one with strong, long-term partnerships with industry leaders like Cisco.  

At Compucom, we can advise you on developing and maintaining a resilient cybersecurity posture, from assessing your current tools and systems to helping you navigate the deployment and integration of best-fit security solutions across your IT infrastructure. 

The post 5 Ways to Improve Data Privacy in the Hybrid Workplace appeared first on Compucom.

]]>
Protect Your Brand: Don’t Let eWaste Become Your Achilles Heel https://www.compucom.com/protect-your-brand-dont-let-ewaste-become-your-achilles-heel/ Mon, 18 Sep 2023 18:34:00 +0000 https://recomp.5oclock.io/?p=4718 Person working to fix a laptopEvery year, organizations discard millions of tons of outdated equipment. If not handled correctly, your old devices could become a security Achilles heel, damaging your reputation and your brand.

The post Protect Your Brand: Don’t Let eWaste Become Your Achilles Heel appeared first on Compucom.

]]>
Jennifer Brooks, Senior Director of Operations

Jennifer Brooks • Senior Director of Operations

How IT Asset Disposition Drives Data Security and Sustainability

Every year, organizations discard millions of tons of outdated equipment. If not handled correctly, your old devices could become a security Achilles heel, damaging your reputation and your brand.

There are three major tenets of a proper IT Asset Disposition (ITAD) process:

Having these in place helps safeguard our customers’ data and protect their reputations while simultaneously promoting and adhering to sustainability goals and best practices.

Detailed Chain of Custody

Protecting your retired devices’ data means keeping track of where they are and controlling access. From when devices leave your hands to the end of disposition, it’s essential to have a detailed chain of custody and extra measures such as secure packaging and shipping with vetted freight carriers.

Facility Security

A tightly controlled environment is a crucial aspect of any facility dealing with your IT assets. Some examples of risk mitigation we use include:

  • Perimeter alarm system monitored by a central station
  • Metal detectors, camera surveillance, and a 24/7 on-premises security team
  • Strictly enforced access and visitor policies
  • Required background checks and regular training for all personnel

Who enters the facilities is limited by key-card access. Customer assets are in alarm-protected segregated areas; the system is triggered by any attempted entry by an unauthorized individual. We ensure visitor escorts accompany customers, truck drivers, or third-party vendors who need access. All visitors are accounted for — a visitor sign-in log maintains visibility of who enters the building at any time. 

Data Security

For customers with assets that still have market value or hard drives, they plan to redeploy, an ironclad data wipe renders data scrambled, leaving no traces of the original data to be recovered. Any facility with disposal methods should present customers with certificates of destruction. This allows customers to hold their facility partners accountable, as well as keep a record of their devices.

Protecting corporate identity is top of mind for us. And the devil is in the details. For example, we ensure the removal of asset tags and other identification labels before disposition. 

The Compucom Difference 

Electronics are the fastest-growing solid waste stream in the US and are 70% of the toxic waste, yet less than a quarter of it is recycled. Keeping as much e-waste as possible out of landfills helps meet organizations’ sustainability goals and enhances a brand’s reputation. 

Reducing e-waste is a key component of IT sustainability, and one way to do this is by identifying devices with resale value. A perk is the extra income your company can make from reselling devices, which can help offset your cost of buying new technology. Devices that no longer have value and cannot be resold are transferred to a certified partner for EPA compliance, eco-conscious disposal, and e-waste recycling. 

Don’t Let Old Devices Come Back to Haunt You

While many organizations focus on implementing new technology, what happens to the devices you replace is just as important. Improper IT asset disposition can lead to data breaches and damage your brand reputation. Proper recycling supports your sustainability initiatives and helps keep dangerous e-waste out of landfills. 

Reach out to learn more about ITAD security and sustainability methods and hear how Compucom’s Advanced Configuration Centers can help you reach your goals. 

The post Protect Your Brand: Don’t Let eWaste Become Your Achilles Heel appeared first on Compucom.

]]>