MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Need to Properly Dispose of e-Waste

Why You Need to Properly Dispose of e-Waste

Technology has become more commonplace in offices and homes all around the world, and you might find yourself replacing it more often than previously thought. This leads to an awful lot of waste that can accumulate in your office, be it an extra smartphone, desktop, or something as simple as a random, non-functional hard drive. However, getting rid of your old, unnecessary tech isn’t as simple as throwing paper into a recycling bin, and it shows in the amount of e-waste that infects the world every day.

Have you ever wondered what happens to your old devices after you throw them in the trash? Eventually, any discarded devices of yours will find their way into a landfill or shipped to a third-world country where they will accumulate. Anything used to construct these devices will have ultimately been wasted, as they are now useless hunks of precious metals, glass, and other resources. Here are some statistics about e-waste that might make you rethink tossing that old smartphone into your garbage can.

  • 45 million tons of electronics were thrown away in 2016.
  • Only 20% of e-waste is properly documented and recycled.
  • $55 billion worth of raw materials are wasted on devices that are thrown away--with smartphones alone accounting for about $9 billion.
  • 76% of all e-waste is ultimately unaccounted for with an unknown endgame.

With more technology being produced every year, it’s natural to see the amount of e-waste rise as time progresses. Yet, e-waste is a considerable issue for your organization. There is one major pitfall that you’ll want to consider regarding your business’s e-waste: data security.

Data Security
Any data that can be found on your business’ devices is at risk of being compromised, and if you no longer own the devices, this risk grows much greater. Consider this scenario; you discard your old smartphone when you purchase a new one, and a hacker finds it after you have disposed of it. They then proceed to access any accounts connected to it, including access to your company’s cloud-based network and data storage. They can do this even with something like an external hard drive.

The logical conclusion to this dilemma is to make sure that your devices are properly wiped or destroyed prior to disposing them. You can do this by either physically destroying the device itself, or by reaching out to MERIT Solutions. We can properly take care of your unneeded devices and follow the right steps to make sure that any devices you no longer need won’t unexpectedly place your organization at risk. Plus, we can help you recycle your devices so that they have a reduced chance of filling a dump somewhere halfway across the world.

To learn more about how to eliminate unnecessary devices in an unwasteful manner, reach out to us at (757) 420-5150.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 21 May 2018

Captcha Image

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Network Security Hackers Malware Software Internet Hosted Solutions Backup google Productivity Business Management Managed IT Services Mobile Devices Disaster Recovery VoIP Computer Microsoft Outsourced IT communications Business Continuity Business IT Support Windows 10 Cybersecurity Email User Tips Hardware IT Services Innovation Productivity Cybercrime Data Backup Efficiency Managed IT Saving Money Server Mobile Device Management Ransomware Mobility Small Business Apps Windows Operating System Data Data Recovery browser Law Enforcement Internet of Things Smartphone Android Virtualization Telephone Systems Save Money Tech Term Cloud Computing BDR Money Passwords Phishing Smartphones Data Security Hosted Solution Quick Tips Communication BYOD Automation VPN Information Technology Password Holiday Office 365 Recovery Chrome Microsoft Office Collaboration Risk Management Unsupported Software IT Support Google Drive Hacking Avoiding Downtime Alert Facebook Health Miscellaneous Government Work/Life Balance Managed Service Provider Computers Cost Management Vulnerability Wi-Fi Update Best Practice Gadgets Social Media Data Breach Budget Data Management Two-factor Authentication Network Social upgrade Wireless App Wireless Technology Identity Theft Telephony User Error Flexibility Shortcut Windows 10 Applications Private Cloud Office tips History Spam Firewall Application Antivirus Proactive IT Managed IT Services Current Events Audit Workplace Tips The Internet of Things Personal Information Employer-Employee Relationship Social Engineering Politics Streaming Media Cleaning USB Save Time search Data Protection Legal eWaste Users Encryption Redundancy iPhone Commerce Mobile Computing Artificial Intelligence Project Management Cortana Big Data Transportation Patch Management Robot Gmail SaaS End of Support Remote Computing Excel Wireless Charging Samsung Data Storage Content Filtering IT solutions Battery OneNote DDoS HaaS Blockchain Compliance Humor Disaster Television Automobile Mobile Security Devices Data Loss Value Marketing Apple Sports Google Docs Saving Time Tech Support WiFi Office Fraud Computer Care Hacker Phone System Going Green Internet Exlporer Bandwidth Solid State Drive Professional Services Scam remote Hard Drive Yahoo Edge File Sharing Relocation Music Access Windows 10s Virus IT Management Travel Employer Employee Relationship Nanotechnology Running Cable Server 2008 Chromebook Ali Rowghani Ciminal Storage Analytics Keyboard Trending Hard Disk Drive Instant Messaging Proactive Credit Cards PDF WIndows Server 2008 Tablets Computer Accessories Root Cause Analysis Worker Commute Smart Tech Mobile Device Managing Stress Websites FAQ Text Messaging NFL Augmented Reality server installation dvd "cannot install required files" Connectivity Scalability stock MSP Lifestyle Business Intelligence Books Touchscreen Hiring/Firing Education Data Theft Charger Outlook Word Vendor Management Router Content Filter How To tweet intranet Legislation Managed IT Service Benefits Laptop iOS Uninterrupted Power Supply Computing Windows Ink calculator Monitoring Twitter IT budget Comparison Unified Threat Management Regulation Touchpad Computer Fan control Analysis Evernote Management Maintenance Google Maps Training Reputation Entertainment WSJ Specifications Upgrades Advertising Screen Mirroring Electronic Medical Records Sync Dark Web Point of Sale Exchange App store Networking altivista Financial Technology Device Security Software as a Service Company Culture Meetings HIPAA Distributed Denial of Service Data storage Emails Black Market Identities Sales Consultant Cast Safety Adobe Smart Technology SBS Workers compaq Printing Administration Settings Chromecast Avoid Downtime Shadow IT IoT Retail Licensing WannaCry Document Management Wearable Technology Identity Updates hp Google Assistant Spyware Colocation Experience Webinar Language Conferencing Hard Drives HBO Mobile Files domain Data Privacy Microsoft Word Video Games Lithium-ion battery Computer Forensics Microsoft Excel Administrator IT solutions Virtual Reality Gifts Thank You Congratulations CrashOverride Emergency Cache Monitors Remote Monitoring Worker

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...