iTecs IT Outsourcing and Support Blog
Many of our clients encounter the inevitable predicament of having an ever-growing graveyard of old computers and devices overflowing in the corner office nobody wants or old storage room employees didn’t even know exists. The worst is when we see a company stack the old equipment in the server room, turning it into a human-sized rat maze. Since you can’t simply throw it all away in the back of some random restaurant’s dumpster, you’re faced with the question, “what do I do with it all?”. We tell our clients they have two options, but before we dive into that, let's discuss the reality of computer recycling companies.
Plenty of electronics recycling companies will come pick up all your old equipment for free, given you have enough of a stockpile to make it worth their while. They “guarantee” to respect your privacy by destroying the data, and responsibly dispose of the hardware to minimize the negative impact on our environment. The reality is, responsible recycling and thorough data wiping aren't cheap. Using free recycling companies can potentially be a huge risk to your business if they use a noncertified recycler, or resell your equipment to the highest bidder. Either scenario can be harmful to your business if the equipment ends up in the wrong hands, leading to possible data breaches and damage to your reputation.
You may still have a monetary value on your gear, and the recycling company should be paying you instead. Your IT vendor or staff should do their due-diligence and research any potential market value for what you need to recycle. Any revenue stream, regardless of how little it may be, should be appreciated and taken seriously. Since the use of technology isn’t go away, you’re likely to face this situation on a reoccurring basis. So why not make a few extra dollars every time that old storage room gets too full?
R2 Standard certified company in Dallas, TX
2929 Glenfield AveDallas, TX 75223
Ransomware is becoming more common due to the success the creators are enjoying due to the improvement of their methods. What were once simple text-based phishing emails are becoming very realistic looking “corporate” fakes.Read More
G-Suite or Office 365 this is the question that has stumped small to medium-sized business owners for years. Now businesses are looking to move into the cloud and need to know where to start and who to use. Some of the most important factors to consider are security, integration, functionality, and usability.Read More
The majority of people use weak or reuse passwords on different websites. How can someone use a complex, unique password on all of the websites and applications you use? The answer is a password manager.Read More