Follow us: 

YouTube IconGoogle+ IconFacebook IconLinkedIn IconTwitter Icon


ITAD Horror Stories

ITAD Horror Stories

Proper IT asset disposition is imperative for your business. Without a secure chain of custody, millions of people’s sensitive data can be stolen and sold into the wrong hands. When data becomes compromised, it can lead to millions or even billions of dollars in lawsuits and the breach of human privacy. There are numerous companiesRead more

What is the Value of My Old IT Assets?

What is the Value of My Old IT Assets?

For companies considering upgrading or selling their old IT assets, there is always the looming question of whether or not their IT assets are too old to retrieve any reasonable value. This uncertainty can keep you and your company from pulling the trigger on any decisions to proceed with a project. Although it depends onRead more

Data Center Liquidation – The Best Approach

Data Center Liquidation – The Best Approach

There are many things a data center manager has to consider when opening a new data center or redesigning an existing one. From how to properly construct and design the room, to outfitting the room with the best equipment at the best price, to ensuring the data center is as green as possible to reduceRead more

The New (Millennial) Way to Recycle Your Old Technology

The New (Millennial) Way to Recycle Your Old Technology

Cloud computing, the Internet of Things, and interconnectivity are just three of the “23 Technologies of 2022” outlined by the IEEE CS 2022 Report, but they are perhaps the most crucial technologies supporting the future of mobile business.  With cloud computing, data and computing power can be stored offsite. The Internet of Things provides instantRead more

Data Destruction – Security Standards and Certifications Defined (Part 2)

Data Destruction – Security Standards and Certifications Defined (Part 2)

October 2014 marks the 11th year of “Cyber Security Awareness Month” as declared by the Department of Homeland Security in cooperation with the National Cyber Security Alliance and the Multi-State Information Sharing and Analysis Center. To support this initiative to defend the American infrastructure against cyber-attacks, we have decided to continue to educate our customersRead more

Data Destruction – Security Standards and Certifications Defined (Part 1)

Data Destruction – Security Standards and Certifications Defined (Part 1)

Our certified data destruction has a lot of certifications that, well, may seem overwhelming to those of you who don’t know a whole lot (or anything, for that matter) about data destruction certifications or data sanitization methods. If you are like most people, you will feel more at ease when seeing that the “U.S. DepartmentRead more

Reuse vs Recycling: Which is Better? (Infographic)

Reuse vs Recycling: Which is Better? (Infographic)

Both reuse and recycling are beneficial to our planet when it comes to technology disposal, but which one is better? We assume recycling is better because the word itself has such a positive connotation in our culture. However, as the infographic below demonstrates, recycling isn’t always the best option for our planet. It also mayRead more

How Windows 10 and IT Outsourcing Will Change Your Infrastructure

How Windows 10 and IT Outsourcing Will Change Your Infrastructure

On September 30th Microsoft released the name and a small set of features for its newest operating system, Windows 10. In the original blog announcement, Microsoft described the application of the new Windows 10 being centered around a “mobile-first, cloud-first world.” This description supports the recent shift in the enterprise IT paradigm from in-house dataRead more

How and Where to Recycle Electronics for Cash

How and Where to Recycle Electronics for Cash

Whether you are a business or an individual, finding a place for your old or excess electronics or IT assets can be seemingly difficult. However, we have just the right advice for someone looking to recycle electronics for cash. In fact, our solution goes beyond recycling and introduces the possibility of remarketing your technology. ByRead more

How to Easily Avoid a Crippling Data Breach

How to Easily Avoid a Crippling Data Breach

What do Jimmy John’s, Home Depot, Target, Neiman Marcus, and Michael’s all have in common? All of these major companies have admitted to having a large data breach in the past year, with the most recent being Jimmy John’s on September 25th. Combined, these data breaches have amounted to sensitive data exposure of around 200Read more

Request a Consultation

  • This field is for validation purposes and should be left unchanged.