Information security is our biggest concern here atElectronic Asset Recycling. Our interest in ensuring the security of our clients’ confidential data is the reason we offer not only data destruction services like wiping the hard drives on any laptop, desktop, etc. we take in, but also hard drive shredding services to guarantee we are able to provide truly comprehensive data security services. While we can help you maintain security at the end-of-life stage for your electronics, what can you do to help protect your hardware while you’re still using it? Our friend Greg over at Wolf Technology Group is happy to help with this week’s guest post off of Wolf TG’s blog.
Creating and maintaining a physical security policy for the devices on your network becomes more critical as your organization continues to grow.
Physical device security is often overlooked in small to medium sized businesses (SMBs) since many organizations are focused on product development, sales growth, etc. In-house IT processes can often fall off the radar during these phases of rapid growth.
In addition, it may not seem practical to implement device security policies because your business may operate within a small facility, possess a small staff, or the value of securing your assets may not justify the costs.

Every Organization Should Have a Physical Security Policy

There’s a popular 3 letter term used in corporate America called “C-Y-A.” This acronym is a humorous reminder that people should cover their rear ends in business deals, should the worst possible scenario present itself.
The best offense is a good defense. Businesses must implement proper physical security procedures to support their technology investments and to ensure the safety and security of the data being used within their line of business applications.
By crafting a physical security policy for the devices on your network, your organization can be confident that its processes are in line with popular industry compliance standards.

Physical Security Best Practices for SMBs

Could your organization be at risk for a physical security breach? Hackers and scammers will stop at nothing to gain to profit off of the destruction of your business.
Because of this, we’ve created a quick list of policies and procedures that will help your enterprise get in line with popular physical security standards.

Perform an Audit of the State of Your Physical Security

How does your business currently track, deploy, and manage the physical security of your assets? How does your business track employees, vendors, and visitors when they arrive at your office? Every organization should have a detailed log of each of these activities, and the log should be able to be produced, upon demand.
Apps and services are available to help your organization keep tabs on each of these activities. Advanced 3rd party applications can even give your IT team the ability to setup alerts whenever policies are broken.
While some organizations may use low tech methods of tracking physical security, such as keeping Excel sheets, others may require more in depth analytics. Regardless of the route you take, here’s a few tips on what your organization should track, monitor and audit on regular basis:

  • Identification: Require that employees, vendors, and visitors have a badge that identifies who they are.
  • Asset Tracking: When new IT assets are purchased, specifications such as serial number, make, and model should be recorded.
  • Asset Deployment: IT staff should develop a system that allows to them to know who has an asset and where it is deployed.
  • Physical Access: Non IT employees should never have access to a room that stores IT equipment.
  • Consider Video Surveillance: If you have a server closet on premises, these assets should always have some sort of video surveillance facing the equipment as well as the outside walls of the room.

Physical Security Policies Regarding Offsite Use of Company Equipment

Many organizations deploy agents into the field with smartphones, tablets, and laptops. How can an IT staff ensure the security of these devices when they aren’t being used within a traditional office setting?
Many solutions exist out-of-the-box while more advanced solutions may require 3rd party applications. Here is a basic overview of how to ensure the physical security of each of these devices.

Securing Smartphones, Tablets and Laptops

Smartphone security is pretty basic in the fact that most users will setup their own PIN to secure the device. After so many incorrect entries, the device can be configured to erase all of the data on the phone.
One popular solution that IT departments are using is called the Prey Project. If a laptop, tablet, or mobile device is stolen and the security PIN number has been breached, the Prey Project helps organizations recover their devices by installing a small, lightweight agent that allows organizations to track and monitor the whereabouts of their devices.
The Prey Project gives organizations the ability to remotely lock the screen, take a picture using the device’s camera, or find the device on a map using a geolocation feature.

Other Physical Security Tactics

You should always use the baked-in data encryption features on the devices that you deploy.
For example, devices running Windows can utilize the BitLocker security feature to encrypt the hard drive of a laptop. Users would have to enter the BitLocker password to continue booting into the laptops operating system.
If your fleet of mobile devices consists mainly of laptops, consider buying a laptop lock for each of these devices. As employees move from location to location, they will be required to lock the laptop onto the desk in which they are using. This ensures that the device won’t be stolen if the employee happens to turn their back or walk away from the desk.

Tying it All Together

Murphy’s Law says, “Anything that can go wrong, will go wrong.” When you evaluate the physical security surrounding your IT assets, use Murphy’s Law as a mindset to consider all of the different things that can happen if the proper policies, products, and procedures aren’t followed within your organization.
Depending upon your organization, a physical security breach could cost your business significantly more than just the value of the assets that you’ve lost. A physical security breach could harm your organization’s reputation, causing potential clients to shy away from using your services.
Begin training your employees on basic physical security practices so that they can become aware of the impact of a physical security breach. Always entertain employee feedback on these policies, as your IT department will be tasked with finding a comfortable medium between enforcing compliance standards and educating users on how to navigate the new policies.
As always, to learn more about our ewaste recycling services just give us a call at (800) 746-1823, or contact us online at any time to request a pickup. Otherwise, feel free to contact Wolf Technology Group!
Not only do they offer a variety of support plans for companies that require regular security and maintenance, they also like to work closely with local Greenville, SC area businesses like yours to help develop their technology and grow their business however they see fit. Their level of involvement can evolve your business. If you need IT support they’ll always help you — contract or no contract. Just give them a call at (864) 248-6316 or click the banner below to get the IT support you need now!

Identity theft is all over the news. Not only are huge multi-national corporations like Target seeing cyber attacks, small businesses and even government agencies are increasingly falling prey to those bent on stealing all kinds of personal information, from Social Security Numbers to credit card details to bank account info.
Reading all these nerve-wracking headlines could lead you to believe that at least your information is safer at home. Unfortunately, that’s not always the case.
Each time you replace a laptop or desktop computer with a newer model, you are risking all the personal information stored on your older, out-of-date devices finding it’s way into the wrong hands. How can you protect against identity theft occurring right near home? Hard drive shredding is the inexpensive, easy-to-access solution! We know you probably have a few questions, and we’d like to take this moment to answer them.

How Does Hard Drive Shredding Work?

Hard drive shredding is easy! At EARecycling, we utilize the Ameri-Shred AMS 150, designed to handle both single hard drives or large volumes depending on our need. We just take your hard drive, feed it into the shredder, and it will slowly crush it until it’s totally destroyed — and the personal information saved on it is gone for good (see for yourself in our video)!

Isn’t Hard Drive Shredding Expensive?

We can shred hard drives for as little as $7, giving you peace of mind for less than it costs for you to go out to lunch. If old computers are building up in your house over time as newer models are purchased, we’d be happy to not only shred your hard drives, but also take those old computers off your hands entirely! You’ll be able to declutter your home and protect your identity at the same time.

Will I Be Able to See My Hard Drive Shredded in Person?

Absolutely! We commonly have our clients request to be present while we shred their hard drives, to ensure that their confidential information never leaves their sight. We have no problems with you standing by to watch your hard drive get destroyed. If you’d like, we can sometimes even allow clients to feed the hard drive into the shredder themselves, so you maintain contact with your information right up until it’s totally destroyed.

Where Can I Learn More?

We’ve written a few blogs on the topic of hard drive shredding, as it’s a service we really enjoy being able to provide for our clients. You can learn about why hard drive shredding is essential for your industry, how it can help small businesses with their IT security, how it aids in asset destruction, and on our hard drive shredding page you can even see a video of it in action!

Where Can I Get Hard Drive Shredding Services?

Right here at EARecycling, of course! We’re in the process of moving further into Greenville from our current location just off Woodruff Road. Give us a call at (800) 746-1823 or contact us online to let us know you’re interested or ask us any further questions you might have about ewaste recycling or hard drive shredding. We’d be happy to answer them! We work both with commercial businesses and also with residential clients. We’ll schedule a time for you to have your hard drive(s) shredded and ensure your family has total IT security.

We here at Electronic Asset Recycling can keep data safe once you get rid of electronics, we aren’t much help when it comes to securing the data on the devices you currently use. To learn how to keep both your data and your client’s data safe and secure, enjoy this guest article from Gregory Wolf at Wolf Technology Group in Greenville, South Carolina.
The main goals of most small businesses are to get more clients and expand on existing revenues. How can you do that if your organization is at risk from a cyber security perspective? In order to safely grow your business, you must enact a list of best practices that will help your organization thrive as your business begins to attract more end users into the environment. Here are 4 tips that can help ensure the safety of your small business.

#1.) Enact Strict Password Policies

The best defense against a brute force password crack is enforce password measures that require your users to update their passwords frequently. You should also mandate a standard complexity scheme in your passwords, requiring them to be lengthy and contain special characters. The first defense against hackers is to create passwords that aren’t easily guessed. Always prohibit the sharing of passwords and monitor service accounts for unauthorized use.

#2.) Setup Two Factor Authentication for Remote Access

When your users connect to your network remotely, they should do so using a two factor authentication methods. These methods are becoming popular because services such as Office 365 have introduced this as a way to further authenticate users when they login to certain portals.
Two factor authentication can be setup to require an RSA token. Other services will send authentication codes directly to the end user’s smartphone via text message or phone call. If a user gets a phone call or a text when they didn’t login to the portal, they’ll know that someone is trying to illegitimately access their account.

#3.) Force Overnight Updating and Virus Scanning of Your Desktop PCs

When you provide desktop PCs or laptops to your end users, you are giving them the ability to introducemalicious code into your environment. Without proper safeguards such as antimalware and antivirus software, your network could be at risk. When you deploy a new workstation to a user, ensure that they have an antivirus client that is able to be remotely updated and that the device is setup scan late at night, when the user is likely away from the machine. Daily virus scanning helps you keep your network operating at optimal levels.

#4.) Software and Hardware Firewalls

Firewalls are a staple of network security. When you configure the software firewalls found on your desktop computers, you can block unwanted traffic from within and outside the network.
In order to block traffic from the internet from penetrating your network, a hardware firewall is setup between your internet connection and the switches that provide network connectivity to your end users.
Always keep the firmware updated and subscribe to any content filter subscription services that may be available to you (if your firewall can support it). Having a firewall between your organization and the outside world is imperative to building a secure network that securely transmits information both internally and externally.

Putting It All Together

When you implement these basic security measures, you can be certain that your organization will have covered the top security threats impacting small businesses today. While each network has its own set of nuances, businesses that have firewalls, proper authentication techniques, and up-to-date antispyware, antimalware, and antivirus programs are several steps ahead of other businesses who may not have implemented these same security measures.
If you know your business isn’t as secure as it should be and need help implementing all of these cyber security measures, give us a call at (864) 248-6316 or contact us online today! We’d love to help you keep both your information AND your client’s personal information safe and secure.
If you enjoyed this article, please check out our blog and join us on Facebook, Twitter, LinkedIn, andGoogle+ to see how else we can help your business succeed!

In our line of work, we’ve run into more than a few shady “recycling” companies who swear up and down that they can do everything for free. If you see an ad for “free ewaste recycling,” what you’re really seeing is likely an advertisement for a scam. Even if they claim to have special certifications, ‘free’ electronic waste recycling is truly anything but.
Even if it doesn’t cost you, it definitely costs the planet. The best-case scenario is that these “free computer recyclers” are sending ewaste overseas, where it will find its way into what are often called “electronic graveyards” in less-developed nations. These landfills full of ewaste become incredibly hazardous to the local population and pollute globally as well, as local residents often burn plastics and other toxic components in order to get to the valuable metals inside. When it comes to electronic waste, “out of sight” is definitely not “out of mind”.
Recycling electronics isn’t cheap. We’ve spoken before about how shockingly fast electronics depreciate in value — this continues even into the recycling process. Often, we pay more to recycle an item than we could ever get back in return through resale or refurbishment. This is true of every single ethical ewaste recycling company. If you see a company advertising the ability to recycle your ewaste totally for free, they still have to be finding a method of turning a profit somewhere.
They may recoup their costs through stealing your information. Computers, copiers, printers, and other electronics all contain a plethora of information about you and your company or household by the time you dispose of them. Most newer-model copiers and printers maintain a record of every job they’ve ever been tasked with. Anyone who takes them in could easily simply reprint old jobs until they find the kind of information they can sell or misuse. Computers will contain entire hard drives’ worth of data that you or your company may want or need to keep secure. That “free ewaste recycler” may simply sell your data to a third-party company for marketing purposes, or they may do something much worse.
Identity theft is on the rise. One easy way to steal someone’s confidential information for identity theft purposes is simply through accessing their confidential information off of office electronics or computers. Most hard drives store all sorts of information that proves to be of immense value to someone looking for something to steal. Discarded computers, which even in corporate settings may have only had mild hard drive wipes, are an identity thief’s dream. Don’t take the risk — make sure you dispose of your old electronics with a reputable company like EARecycling.
We don’t advertise that our recycling services are “free” because we have a serious commitment to ethical ewaste recycling. Your data security is our most important concern. Not only do we provide a Data Destruction Guarantee, but we are also just about the only ewaste recycling company in the state of South Carolina to have our very own transportable hard drive shredder. We can either wipe your hard drives clean or provide our hard drive shredding services for total security. We’re even able to shred on-site, so you never lose track of exactly where your confidential information is at any moment.
The next time you see a company pushing “free computer recycling,” keep this in mind — the company providing those services has to recoup their costs, and you don’t want to find out they did so by stealing your information. Give us a call here at EARecycling and we’ll walk you through everything we do step by step so that you know your information is secure. You can reach us by phone at (800) 746-1823 or contact us online to request a pickup.

At EA Recycling, we work hard to live up to our Total Destruction Guarantee, but we know that sometimes it’s just not enough to be promised that a hard drive will be wiped clean. We’ve made it the foundation of our business to be able to assure you that personal or sensitive data will never make it out of our facility, that’s why we are one of very few in our industry to provide not just the erasure of data, but the physical shredding and destruction of the hard drive itself. But how do you know if a service like yours needs a service like ours?

Why Should You Destroy Your Hard Drive?

We all know a used computer’s hard drive contains a lot of personal information, but for some industries there is an even bigger risk that comes along with having even larger amounts of sensitive data. Law firms, medical facilities, banks, accounting firms, and real estate agencies, for example, have LOADS of old e-mail messages, credit-card information, bank-account numbers, medical info, and Social-Security numbers on their hard drives, along with other personal information. When disposing of a hard drive it is essential to dispose of it safely and in a reliable manner. That is why our process ensures 100% data destruction, and we can provide every client with a data destruction guarantee.
We use the Ameri-Shred AMS 150. The Ameri-Shred AMS 150 destroys hard drives as easily as a traditional paper shredder rips through paper, except these machines are more powerful and capable of destroying a variety of different hard-drives and sizes. These shredders are also good for destroying other data-storage devices like cell phones, tablets, USB drives, etc., meaning we can offer you truly comprehensive ewaste recycling and destruction services.

Get Started Today!

Electronic Asset Recycling is a proud member of The National Association for Information Destruction, a global group that ensures that when you need truly secure data destruction, you can always find a company providing the very best.
Whether you’re looking for an ewaste disposal partner for your business or for your personal electronics, EA Recycling can handle all of your secure data destruction and hard drive shredding. If you still aren’t sure if hard drive shredding is right for you, give us a call at (864) 252-0418 or toll-free at (800) 746-1823 — we’ll listen to your needs and help you find the best possible solution for your ewaste problem. If you’re ready to get shredding, you can request a pickup today! 

When upgrading your company’s software or electronics, you need a way to safely and legally dispose of the old equipment you’ll no longer be using. An offshoot of every company’s IT Asset Management should be IT Asset Disposition. In short, ITAD is the business of safe, environmentally conscious IT asset disposal. As technology continues to improve by leaps and bounds, your business is bound to wind up with electronic equipment you simply have no use for. Since tossing those old electronics into the trash is illegal in South Carolina, the best choice a business could make is to partner with someone in the IT Asset Disposition industry to make sure things are taken care of responsibly.
Why is IT Asset Disposition essential for both large and small businesses?

  1. When you don’t have a plan, you’re taking a big risk. A shocking number of companies operate without an ITAD plan in place. Data can be stored on nearly every electronic device your business uses, from copiers to printers to scanners. If these devices make their way out into the world, that’s a lot of sensitive company information that could potentially wind up in the wrong hands.
  2. Aside from data leaks, you could wind up in court. We mentioned that dumping in South Carolina is illegal. It doesn’t have to be a large-scale operation for DHEC to get involved. Just a single laptop here or there found in a landfill can be traced back to your business and could wind up costing you thousands of dollars a day in cleanup fees while the state attempts to locate any further waste that may have been illegally dumped. Even beyond those cleanup fees, you can be fined an additional $10,000 a day for as long as the cleanup operation is ongoing. Costs like that add up, and could cost you your business.
  3. Business disruptions due to stolen data make for a bad reputation. While you’ll likely never be looking at the kind of data loss that companies like Target have dealt with, even a small data loss, if publicized, could cost you clients. People working with a business want to know that their data is secure, even when old electronics are disposed of. A business working without an ITAD partner may find themselves in the newspaper when their computers are found dumped in landfills or client data is recovered off of supposedly ‘clean’ electronics.

Electronic Asset Recycling provides safe, environmentally responsible electronic waste disposal and recycling. Rather than finding yourself wasting time worrying about setting up an ITAD plan, let us do it for you! When you partner with us, we provide onsite ewaste pickups, Total Data Destruction guarantees, and even utilize hard drive shredding for those times that a simple wipe doesn’t seem secure enough. Partnering with EA Recycling ensures that you get the IT Asset Disposition (ITAD) your company deserves with just one phone call. Interested in learning more? Give us a call at (800) 746-1823 or click the banner below to contact us today!

Businesses aren’t the only ones worrying about security these days. Even our residential customers whose electronics are only for personal use are increasingly worried about their personal or financial information being accessed by people who might exploit it.
At Electronics Asset Recycling, we’ve made it  foundation of our business to be able to assure you that your personal or sensitive data never makes it out of our facility. What steps do we take to ensure that your information remains safe?

  • Total Sanitization. We wipe your hard drive completely clean, ensuring that nothing is left that might compromise your household or company. If that isn’t possible, we’ll shred the hard drive, rendering it completely inaccessible. We promise secure hard drive destruction.
  • High Standards. Our secure data destruction standards match those of the Department of Defense. You can read more about those standards and what that really means here.
  • Data Destruction Guarantee. We can provide a written guarantee of data destruction. That means that we stake our reputation on maintaining your data security. We put our all into ensuring that none of your information ever leaves our facility.

The idea of our personal, financial, or company records or info being stolen or misused is a pervasive worry today. As more companies are hacked and more sensitive information finds its way into the wrong hands, we field more and more questions on what we can do to maintain confidentiality. Electronic Asset Recycling guarantees 100% total data destruction. Partner with Ever Green Environmental and rest assured that your company is working with experienced professionals who will ensure that your data stays secure. Need more information? We’d be happy to speak with you! You can reach us by phone at (800) 746-1823 or request a pickup online today!