Securing IT Hardware Assets – An Opportunity for MSPs

Differentiation in Managed IT Service Businesses Companies – whether small, medium, or large – are experiencing continuous pressure for change in computing resources. Software is changing from proprietary solutions to open source, and hardware architecture is rapidly moving to the cloud for convenience and performance. C-level executives are looking for ways to remain competitive while… Read More »

Good Questions to Ask about Data Destruction

Every day the media publishes stories about companies whose data resources are hacked, resulting in loss or theft of private, corporate and personal data. While many of these incidents involve people using online computer devices with all sorts of security technology, hardware, software and processes in place, they also involve organizations and municipalities whose hardware… Read More »

Castaway Technologies Earns NAID® AAA Certification for Data Destruction

FOR IMMEDIATE RELEASE Castaway Technologies Earns NAID® AAA Certification for Data Destruction Methuen, Massachusetts – September 3, 2019:  Castaway Technologies has been granted AAA Certification by NAID® – National Association for Information Destruction. As the only true watchdog association that thoroughly audits data destruction providers worldwide, NAID® is a division of the International Secure Information… Read More »

Managing Your IT and Data Center Assets’ End-of-Life

  Your IT equipment ages while new technologies and performance features are introduced to the marketplace. As an IT or Data Center Manager, you are faced with how to effectively manage these end-of-life (EOL) assets. There is inherent or assumed value in used equipment because of marketplaces like eBay and Amazon or outdated, misperceived values… Read More »

Information Technology Control from Infancy to Retirement

Until recently, electronic equipment has been leading two separate IT lives. When functioning and managed by a vendor company, it’s known as “managed services” or “IT Service Management” (ITSM). When the equipment is replaced, disposed of or taken offline by a company, it’s called IT Asset Disposition (ITAD). Simply stated, ITSM manages and services current… Read More »

Electronic Data Disposal: Sanitize or Destroy?

Long gone are the days when your IT staff smashed electronic devices in the parking lot and tossed the refuse into the dumpster. Data thieves and the legal and financial ramifications of sensitive data breaches make self-disposal a dangerous option. Responsible businesses take data security seriously and partner with an IT asset disposition (ITAD) firm… Read More »

China’s National Sword Guts Global Recycling

4/17/19 China’s National Sword Guts Global Recycling Recycling across the material spectrum has become second nature to individuals and businesses. Every week, individuals and businesses toss paper, metals, plastics and glass into recycling bins or have e-waste such as computers and phones hauled to e-cyclers believing it will be transformed into something new. We do… Read More »

GDPR Considerations Involving Data Breaches

Data breaches involving the exposure of sensitive personal information have been increasing at an alarming rate. In the United States alone, Statista, an on-line statistics portal, reported 1579 data breaches with 179 million records exposed during 2017, a 44% increase from the previous year. To ramp up protection for its 750 million citizens, the European… Read More »

Beyond Data Privacy Risks – the Growing e-Waste Problem

2/15/19  Beyond Data Privacy Risks – the Growing e-Waste Problem Before you allow your IT staff to toss out or start dismantling unwanted, broken and obsolete electronic equipment, also known as e-waste, please be aware of the health and environmental risks associated with certain internal components. Now your staff might think, “There’s no way our… Read More »

Leave No Confidential Data Trace!

12/21/18 Leave No Confidential Data Trace! We live in an age when improperly disposing of old IT assets can lead to serious business consequences, especially if confidential employee and customer information falls into the hands of data hackers. Unfortunately, most companies focus on the purchase and maintenance phases of the IT life cycle, leaving the… Read More »