Cyber Tip of the Day - Device Disposal
To help promote Cybersecurity Awareness, we would like to start your week with a tip to stay safe online. Today’s subject: Computer and Mobile Disposal.
Before disposing of or selling your computer or mobile device, know that your devices contain plenty of sensitive and personal information about you which can be misused for identity theft and fraud.
Here are some cybersecurity tips to protect yourself:
- If there’s any data that you wish to retain, make a copy of it before going any further.
- Ensure that you delete all accounts from the devices you’re planning to dispose of or sell.
- When it comes to cybersecurity, don’t take chances with the data on your drives. Use a free data destruction program to completely wipe clean and sanitize your drives before you get rid of them or sell them
- When it comes to removing your data from storages like your drives, know that simply deleting that data doesn’t make it go away. That data can still be retrieved with free tools available online.
- For your smartphone, perform a “factory reset” to delete all your data. Make sure you remove all SIM and SD cards from it and prevent a future cyber attack.
Be Smart. Be Aware. Be Secure. ERMProtect.

Get a curated briefing of the week's biggest cyber news every Friday.

Turn your employees into a human firewall with our innovative Security Awareness Training.
Our e-learning modules take the boring out of security training.
Intelligence and Insights

Red Flags to Be Aware of in Penetration Testing Companies
It is important to do your research when selecting a penetration testing company. Here are a few red flags to be aware of when choosing penetration testing companies …

How To Test for PCI Compliance
PCI Compliance tests are a critical step in protecting your organization against cyber threats. We outline the importance of PCI Compliance tests here …

5 Types of Cybersecurity Penetration Testing
If you are looking for ways to improve your company’s cybersecurity, this guide can help. Here are five types of cybersecurity penetration testing …