Contact us today!

FRS Pros Blog

How to Get Rid of an Old Computer Without Sacrificing Security

How to Get Rid of an Old Computer Without Sacrificing Security

Time passes, and things get old. This is especially true of technology, as new and better options are developed and released all the time. Sooner or later, you’re likely to find yourself in need of a new system… The only question left is how to get rid of the old one.

As with most subjects we discuss in this blog, there is a right way of doing things, and a very wrong way of doing things. This case is no different.

That’s why we’re going to take you through the how (and why) of properly disposing of an old desktop or laptop.

Deal with Your Data

While you want to replace the piece of hardware that you use on a daily basis, you probably don’t want to lose the data you have saved on it, right? Therefore, you are going to want to be sure that all your data is properly backed up and protected before you remove it from your old device.

Why remove it at all? That’s simple enough--once your old hardware leaves your hands to be disposed of, you have no guarantee that it will be secured throughout this process. As a result, you can't be sure that one of its storage components won’t be taken and your data extracted.

Of course, just deleting your data isn’t going to cut it. You should instead use a special software solution to delete and overwrite all stored data, preventing any potential data recovery efforts. Then you will need to encrypt the drive, deauthorize your computer from any accounts, delete any and all browsing history, and uninstall any programs on the device. A quick factory reset at the end will ensure your data is good and gone.

Of course, you also have the option to remove your hard drive and either physically destroy it or securely store it as an archive.

What If The Computer Won’t Turn On? I’m Safe, Right?

Unfortunately, there is no guarantee that your dead computer no longer has any data on it. In fact, your data is likely still in there, as the majority of issues that “kill” the computer leave the hard drive untouched. This means there’s good and bad news for you… the good news being that your data can likely be saved by someone who knows what they’re doing, the bad news being that hackers tend to know that they’re doing as well.

Getting Rid of the Computer

Once you are confident that your old system no longer contains any data, you can get rid of it--but you do have to be careful of how you do so. Leaving it on the curb like a couch from a college apartment isn’t an option. You may not have known this, but your computer and other electronics contain heavy metals and materials that can cause serious harm to the environment, so just dumping it into a landfill is dangerous and irresponsible.

Therefore, it is better to recycle it… but even then, you have to be cautious. Some recycling companies will take your machine and send it to a developing nation, where children will pick through the hazardous materials we mentioned to extract valuable materials from its components, thereby poisoning groundwater. Make sure you find a resource that will only leverage recyclers that operate ethically.

Finally, you could also donate your system once you’ve wiped or replaced the hard drive. Many good causes could use computers, but don’t always have the means to procure them.

FRS Pros can help with this process from start to finish. Reach out to us at 561-795-2000 to learn more.

Automation Challenging Longstanding HR Norms
Get More Done on Your Smartphone with these Tips

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Productivity Privacy Business Computing Software Internet Hackers User Tips Google Microsoft Hardware Cloud Innovation Business Management Data Computer Efficiency Smartphones Email Tech Term Windows 10 Communication Data Backup Cybersecurity Hosted Solutions Mobile Devices IT Services IT Support Malware Data Recovery Upgrade Office 365 Android Smartphone Business Browser Outsourced IT Internet of Things Gadgets Backup Windows Small Business Workplace Tips Apps VoIP Users Data Security Phishing Communications Cloud Computing Cybercrime Business Continuity Saving Money Disaster Recovery Information Managed IT Services Automation Mobile Device Management Network Operating System Managed Service Miscellaneous Ransomware Facebook Two-factor Authentication Vulnerability Money Collaboration Artificial Intelligence OneNote Alert Server Passwords Law Enforcement Social Media Employer-Employee Relationship Blockchain Spam Wireless Chrome Virtualization Networking Managed IT Services Microsoft Office Holiday Best Practice Managed IT Health Applications IT Support Google Drive Settings Hacking Windows 10 Windows 7 Gmail Save Money Computers Data Storage Retail Bandwidth Mobile Device Information Technology Word Patch Management Telephone Systems Project Management Access Control Managed Service Provider Tech Support Printing Bring Your Own Device Data Breach Unsupported Software Augmented Reality BYOD Password Router App Quick Tips Fraud Hosted Solution Avoiding Downtime Mobility BDR Search Evernote Business Technology SaaS Proactive IT Software as a Service User Error Hard Drive Display Touchscreen Budget Application WiFi Cortana Going Green Human Resources Social Encryption Data Loss Government Wireless Technology Payment Cards Safety Data Management Conferencing Robot Audit Wireless Charging Meetings Paperless Office Google Docs Data Protection Productivity The Internet of Things Devices Risk Management Sports Mobile Security Mobile Office VPN iPhone Vendor Cost Management Telephony IT Management Google Assistant History Wi-Fi Marketing WannaCry Travel Commerce Hybrid Cloud Update Excel Voice over Internet Protocol Shortcut File Sharing Politics Medical IT Smart Devices Apple Value Wasting Time Vendor Management Webinar Benchmarks Holidays Tablets Maintenance Data Privacy Scam Consultant Micrsosoft Sales Proactive Amazon Downtime Managed IT Service Sync Laptop Education Remote Monitoring Investment Storage Social Engineering Gamification Transportation Keyboard Shortcuts 5G Sabotage Troubleshooting DDoS Edge Accessory Private Cloud Samsung IT solutions Myths Files FAQ E-Commerce Copiers Recovery NFL eWaste Business Intelligence Disaster Websites Virtual Assistant Managed Services Provider Testing Touchpad ROI Identities Memory Legal iOS WIndows Server 2008 Charger YouTube PC CRM Ciminal Computer Forensics Peripheral Antivirus Windows 10s HBO Threats Alexa for Business Computer Care Nanotechnology Inventory Administrator Device Security Chromebook Co-Managed Services Screen Mirroring Digital Signage Data Theft Facebook Privacy Streaming Media Adobe Workers Camera Humor Battery Unified Threat Management Windows Server 2008 R2 Lithium-ion battery Legislation Language Financial Payroll Employees Instant Messaging Hacker AI Management Solid State Drive Scams Employee Emergency Root Cause Analysis Access Windows Ink Telephone Personal Information Emails Cast Firewall Gifts Computing Computer Fan eCommerce Chromecast Licensing Updates Projects Point of Sale Upgrades Comparison Security Cameras Outlook OneDrive Keyboard Smartwatch HIPAA Microsoft Excel IT budget PowerPoint Admin Reputation Entertainment Hard Disk Drive Virtual Private Network Data storage Break/Fix Hosted Desktop Internet Exlporer Google Maps Spyware Hyperlink Identity Theft Processor Credit Cards App store Fiber Optics Microsoft Word Identity Printers Office Development Specifications Virus Remote Computing Machine Learning Employee-Employer Relationship Server Maintenance Remote Work Uninterrupted Power Supply Wireless Internet Saving Time IT Solutions Remote Workers Regulation USB Worker How To Books Training Monitors Office tips Hiring/Firing Net Neutrality Video Games Experience Advertising Virtual Reality Television CrashOverride Twitter Work/Life Balance Current Events Electronic Medical Records Company Culture Crowdsourcing Employer Employee Relationship Benefits Phone System Save Time End of Support HaaS Computer Accessories Smart Technology Relocation Flexibility Music Thank You Communitications Scalability Analytics PDF Congratulations Compliance Black Market Cleaning Mobile Computing Big Data Automobile es Text Messaging Managing Stress Cache