Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»How to Dispose of Electronic Devices Properly
    Cyber Security Awareness Month Tip

    How to Dispose of Electronic Devices Properly

    By Sofia CoraOctober 13, 20232 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    For today’s national Cybersecurity Awareness month tip, we’re going to go over how to dispose of your electronic devices properly and securely, from the software to the hardware, and the differences between getting rid of a university-owned device vs a personal one.

    Erasing Data Before Disposal:

    Before deleting any data, make sure it’s backed up. Fordham allows for students and faculty to use OneDrive to store their data on a cloud based server, however it is recommended to have both physical and cloud based backup options in case of data loss or theft.

    If you simply want to delete the data you can simply perform a factory reset/wipe on your device and it will erase all of the data on that device. However, even deleted data on the device it can still be recovered.

    • A more effective way of deleting your data is to delete and then overwrite the data. When you delete a file from memory, the data is still there but can now be written over. For Mac’s using the built in erase function in disk utility is good for choosing how many times you want to rewrite over the data. For Windows, users can use the windows formatting tools.
    • You can physically destroy your hard drive as well. There is a spinning disk inside a hard disk drive (HDD) and you need to puncture that disk to destroy the data on the storage device and make sure it cannot be accessed. If you have a solid-state drive (SSD), you may need to make several puncture in the disk or use a shredder An SSD has several memory chips and if one is still intact, your data could be recovered.

    It’s also important to have a data retention policy for your business unit, this involves creating guidelines on how long certain information is kept and when it should be properly disposed of. With the data retention policy, you should also keep a log of how something was destroyed, when it was destroyed, and what destroyed it. 

    If your device is university-owned and no longer of use, contact Fordham IT at 718-817-3999 or bring your device to one of the walk in centers  (McShane 266 or Lowenstein SL18) and they will hand the device over to Information Security & Assurance who will wipe or degauss your device for you and issue you a replacement.

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Disposal Security Awareness
    Previous ArticleCybersecurity Is All Of Our Responsibility
    Next Article How To Limit The Amount Of Spam You Receive

    Related Posts

    10 Critical Network Pentest Findings IT Teams Overlook

    Password Reuse Epidemic: Nearly Half of User Logins Compromised

    Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d