Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Alerts»How to Dispose of Your Electronic Devices
    Alerts

    How to Dispose of Your Electronic Devices

    By Gerald Johnson Jr.October 19, 20223 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    Do you happen to have an old device and looking to upgrade? Maybe you already have a bunch of old electronic equipment and are looking at how to dispose of it properly. You came to the right place. We’re going to be learning how to securely dispose of your old electronic devices.

    Erasing Data Before Disposal

    Before you delete any data from your device make sure you have it backed up somewhere. If you want to permanently delete the data and not have any copies of it then forget the former. There are three main ways to delete data from the storage drive of your device such as deleting the data, overwriting the data, and destroying the storage drive.

    • If you simply want to delete the data you can simply perform a factory reset/wipe on your device and it will erase all of the data on that device. A forewarning though, although you deleted all the data on the device and can see that it is deleted. It can still be recovered and is not the most secure way of verifying that all your data on a device is truly destroyed.
    • A more effective way of deleting your data is to overwrite entirely the existing data or just the deleted data. When you overwrite completely new data on a storage device, the old data is no longer accessible and the device can then be disposed of properly or donated with no worries.
    • If you simply want to dispose of the storage device you can physically destroy it as well. There is a spinning disk inside a hard disk drive (HDD) and you need to puncture that disk to destroy the data on the storage device and make sure it cannot be accessed. A solid-state drive (SSD) is one big storage device and can simply be punctured as well to have the same effect.

    Disposing of the Device

    My recommendation if you are wanting to dispose of the product and no longer want any use of it is to overwrite the memory and then destroy it after. This allows for redundancy purposes in case any malicious person attempts to try and piece the information on the drive back together. If you simply want to donate or sell the device then I recommend simply overwriting the data and you will be ready to get rid of the device. If you simply want to recycle the equipment then I recommend you to look up your local guidelines on electronic disposal or follow the EPA’s guidelines.

    https://www.epa.gov/recycle/electronics-donation-and-recycling

    Source: https://www.cisa.gov/uscert/ncas/tips/ST18-005

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Alerts Cybersecurity Awareness Month Tip Cybersecurity Month Device Information Security Guides Mobile
    Previous ArticleHow to Make Your Mobile Device More Secure
    Next Article Digital Signatures: Why They are Important

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d