24 May 2015

Identity Theft Expert

Robert Siciliano - IDTheftSecurity.com

591Posts 1,486,499Views 60Comments

How to safely and securely recycles Devices

21 May 2014  |  1347 views  |  0

Don’t just throw out your old devices; take measures to protect your personal information.

 

Back Up

Before ridding your device, back up everything on it—everything. Use an automated PC service and/or a flash drive. For the iOS and Android, activate Apple’s iCloud or the Google Auto Backup service.

Wipe

Wiping refers to removing all your data. Simply hitting “delete” or reformatting the hard drive won’t do. I purchased 30 used computers off Craigslist, scoured their hard drives with a forensics expert, and discovered that half of the devices—that had been reformatted—still had personal information.

To wipe Windows PCs, you can use Active KillDisk. For Macs, use the OS X Disk Utility or WipeDrive. “A factory reset should be enough to secure most recent smartphones, provided that you remove any SIM cards that could contain personal info. To be super safe, use Blancco Mobile to wipe the iOS or Android.

Destroy

If you can’t wipe the device, destroy it if you don’t plan on donating or reselling. For example, I recently recycled a laptop that was missing its power supply, so there was no way to turn it on and wipe the disc. Instead I removed the hard drive with a screwdriver, and then took a sledgehammer to it. (Aside from protecting my personal data, it was also a lot of fun.)

Recycle
Ask the recycling company just who does the downstream recycling so that your e-waste doesn’t find its way into a foreign landfill. Make sure the company is part of R2 (Responsible Recycling) or e-Stewards certification programs.

Keep Records

Make sure you document donations with a receipt so that the IRS can give you a little return.

 

TagsSecurity

Comments: (0)

Comment on this story (membership required)
Log in to receive notifications when someone posts a comment

Latest posts from Robert

3 More Ways Criminals use influence to steal

14 hours ago  |  429 views  |  0  |  Recommends 0 TagsSecurity

3 Ways Criminals influence to steal

22 May 2015  |  657 views  |  0  |  Recommends 0 TagsSecurity

Tax Return Basics: What You must know!

16 May 2015  |  2644 views  |  0  |  Recommends 0 TagsSecurity

Time to check your Facebook Privacy settings

14 May 2015  |  2685 views  |  0  |  Recommends 0 TagsSecurity

How Hackers use LinkedIn to Scam

13 May 2015  |  6245 views  |  1  |  Recommends 0 TagsSecurity

Robert's profile

job title Security Analyst
location Boston
member since 2010
Summary profile See full profile »
Security analyst, published author, television news correspondent. Deliver presentations throughout the United States, Canada and internationally on identity theft protection and personal security....

Robert's expertise

Who's commenting on Robert's posts

Ketharaman Swaminathan
Bjorn Soland
Prasenjit Das
John Serocold
Charmaine Oak
Iain Montgomery
Otmane EL RHAZI
Boris Taratine
Michael Rosenstein
Fred Pyziak
Matt Scott