Whenever you delete a file on your computer, traces of it are left in places that aren’t always apparent. Clever hackers and legitimate computer specialists can often reconstruct files that you thought were long gone.
Therefore, if you are scrapping old equipment, it is imperative that you have it destroyed and shredded completely so that it becomes impossible to retrieve any such information.
Using cutting edge technology, Secure IT utilise shredding units fit for purpose, shredding up to 3000 devices a day which conforms to the most stringent standards and mandates.
Our hard drive destruction services are the most secure and cost effective way to permanently destroy your data. Our standard service is shredding no larger than 11mm particles, but we do have the ability to shred to 6mm if a more thorough service is required.
We make sure that your secure hardware disposal complies with all the relevant legislations with minimal environmental impact. Not only do we offer secure data wiping, we hold the permits and licences required for the scrapping of the physical machines, detailed here:
We understand how important it is that every device that we receive is disposed of correctly, so that the data is completely inaccessible. We take data wiping extremely seriously and are proud to have an excellent track record when it comes to correctly and successfully destroying sensitive information.
Our On-Site data wiping is second to none. We offer a bespoke solution to each customer to suit their individual requirements. We are big enough to deal with any requirement you have and small enough to offer you the customer service that gives you complete peace of mind.
After four years of preparation and debate the GDPR was finally approved by the EU Parliament on 14 April 2016. It will enter in force 20 days after its publication in the EU Official Journal and will be directly applicable in all members states two years after this date. Enforcement date: 25 May 2018 – at which time those organizations in non-compliance will face heavy fines.
The EU General Data Protection Regulation (GDPR) replaces the Data Protection Directive 95/46/EC and was designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy. The key articles of the GDPR, as well as information on its business impact, can be found throughout this site.
For more information please visit www.eugdpr.org
Technology is ever changing and evolving; therefore, you should always find yourself upgrading your IT Hardware on a 2 to 3 year life-cycle. The problem you are then faced with is what to do with all the old equipment?
With many companies moving to virtualisation and cloud based systems, a lot of old IT equipment potentially containing sensitive data, is being left to rot away in basements, instead of being securely erased and cashed in on whilst there may be some residual value.
A key element to the success of any decommissioning strategy is for you to have a holistic view of the entire hardware life-cycle, as only then can you properly make the decision to Reduce, Reuse or Recycle your old IT.
By understanding and accepting how technology changes over time, it makes sense to upgrade your equipment before it reaches its end of life and there is still some value in it for you. By taking this approach, you can help ensure that you are managing your technology life-cycle in a much more cost-effective way.
It is important to consider the true total cost of ownership of your IT hardware at all times. Overall, you can achieve a great deal of value by adopting a sustainable perspective to decommissioning. You just need to ensure it is a continual process rather than an occasional spring clean.
Taking an ‘all in one go’ approach to upgrades leaves your company vulnerable to outages and downtime so we strongly recommend a more staggered approach. Setting out a quarterly upgrade and decommission program reduces the possibility of failures and outages and eliminates total black out scenarios.
We can work with you to organise such a strategy to analyse your existing technology and evaluate the best time to upgrade it, ensuring you get the best outcomes for your business and best returns on still usable tech.
Call us now to arrange a free consultation.
The common problem is that deleted files are not really erased and so may be recovered by interested parties. Most file systems only remove the link to data, but even overwriting parts of the disk with something else or formatting it may not guarantee that the sensitive data is completely unrecoverable.
In recent years, the loss of sensitive data from Public and Corporate businesses has become a hot issue with the ICO imposing large financial fines.
One of the key areas where an organisation becomes vulnerable to this is at the point of disposing of the unwanted, old IT equipment after it has been refreshed. A lot of organisations do not give their old data, that is stored on the old equipment, the sufficient security consideration it deserves as this can often incur additional costs which are not budgeted for. There is a duty of care for the total life cycle of the equipment, including data.
We work with some of the largest public bodies in the UK and Corporate Companies in the world.
We have designed Secure IT Services to provide a first class IT disposal service for Government, Public & Corporate sectors, providing our clients with all of the IT Security & Legal responsibilities.
Computers that you no longer need should be disposed of with care. Our computer disposal service is secure and cost effective. Your data will be professionally erased with us eliminating the risk of your data being obtained by other parties.
We will collect your redundant IT equipment, data wipe or destroy all hard drives and storage media, provide you with an Asset List and a Certificate of Data Destruction.
Our computer disposal staff will arrange with you a suitable time to collect your equipment. On collection we will provide you with an ‘Asset Transfer Note’ which will transfer liability of your old equipment to us.
We will then return the equipment to our processing facility, where we will produce an Asset List consisting of the collected equipment: Type, Make, Model, Serial Number and any Asset Tag information you may have.
As an experienced IT recycling supplier within the NHS, Education, Central Government and Corporate Space, Secure IT is perfectly placed to provide its customers with guidance through this complex market.
Our engineers will attend your site with our own custom built equipment to ensure they can undertake the data wiping activity. Our staff will create a comprehensive asset list on site of all the equipment that is being disposed of and will also remove all hard drives from the equipment. Hard drives will then be data wiped in our specialised equipment using Data Wiping software which is a CESG Infosec 5 approved. Once all data is wiped from your devices, a comprehensive report of the individual hard drives will be produced and a certificate is provided.