Cookie Consent by Free Privacy Policy Generator Update cookies preferences

July 30, 2013Comments are off for this post.

e-Cycle BYOD Mobile Data Security Tips #4 – Keep Mobile Device Software Up-to-Date

As a global leader in the mobile buyback and recycling industry, e-Cycle is pleased to share the fourth video in our series of BYOD mobile data security risks and recommendations for organizations thinking of implementing a Bring Your Own Device (BYOD) program. These tips will help to secure your sensitive mobile data on individually-owned wireless devices.

e-Cycle BYOD Mobile Data Security Tips - #4 Keep Mobile Device Software Up to Date from e-Cycle LLC. on Vimeo.

—————————————————————————————————

e-Cycle is the trusted wireless mobile buyback and recycling partner for many of the largest organizations in the world. As the first mobile recycling company to achieve e-Stewards certification, we adhere to the highest standards for environmental responsibility and worker health and safety. e-Cycle offers a simple, secure, environmentally responsible and profitable way for businesses to sell and recycle used mobile phones and tablets. Learn more at www.e-Cycle.com.

Businesses Request a Quote Button

 

 

May 24, 2012No Comments

Preventing Mobile Phone QR Code Data Security Issues for Enterprise and End-Users | e-Cycle

The latest trend in mobile marketing, QR Codes or Quick Response Codes, is also becoming the newest pitfall in mobile phone security. Smartphones quickly scan the square, two-dimensional barcodes and immediately direct users to a website, subscribe them to an email list or download additional marketing materials. The fast and convenient solution makes QR codes the perfect way to connect with businesses during an event or tradeshow and consumers on the go. However, cybercriminals have also begun to use QR codes to infect smartphones and obtain sensitive information from these mobile devices.

Mobile phones and tablets contain an overwhelming amount of confidential data. Sensitive emails, business contacts and passwords are all available on cell phones and pads. Making this information susceptible to hackers can be disastrous and while most people have learned to think twice before clicking on a suspicious link that was emailed to them, they do not exercise the same level of caution when it comes to QR codes. This lack of protection makes QR codes a growing risk in mobile security.

Since these QR codes are still relatively new technology, security measures and protections have not been effectively developed to ensure protection for the users. Both the consumers scanning the QR codes as well as the companies developing this technology need to understand the security threats and watch for the warning signs.

Users should be aware of the mobile security risk that QR codes pose and view the website they are directed to before scanning. Various QR code applications allow the option to preview the link prior to scanning the barcode. This precaution prevents the user from scanning a code when the URL appears suspicious. Often times when a QR code is fraudulent, it will lead the user directly to a login screen. Cybercriminals use this form as a trap to retrieve personal information. In most instances, personal information should not be required when scanning a QR code. Legitimate codes will automatically complete a request or will only require contact information for subscriptions.

Businesses utilizing QR codes also have a responsibility to ensure their codes are safe and do not end up getting hacked. In order to ensure the security of their customers' sensitive data, businesses need to provide context for the QR codes when it appears on marketing materials. This will provide users with peace of mind when the link they were expecting appears. Companies should also reveal the exact URL where the user will be directed after scanning. Make sure all the steps to the process are transparent so it does not appear your organization is attempting to take advantage of the user.

As technology continually evolves, hackers develop new and different ways to infiltrate the confidential information contained on cell phones and tablets. Though QR codes provide an ideal marketing solution for businesspeople and consumers on the go, they are becoming yet another portal cybercriminals are using to steal information. While mobile device security is still being developed for these barcodes, users need to be aware of this new area of risk to take the proper precautions when scanning QR codes to smartphones.

For more information or to view the full story QR Code Security Best Practices by Ramon Ray at http://www.businessinsider.com/qr-code-security-best-practices-2012-5.

e-Cycle’s Enterprise Solutions for End-of-Life Mobile Phone Recycling and Data Security
Helping organizations take a more responsible, secure and profitable approach to wireless mobile phone recycling, e-Cycle collects used mobile devices from businesses and organizations, reimbursing them for devices that retain value and recycling all others at no charge. The information on every phone is either deleted or destroyed using the industry’s most rigorous data security measures. In January 2012, e-Cycle became the only mobile buyback and recycling company in the world to become e-Stewards certified. To find out more on e-Cycle’s mobile phone buyback, recycling, and data deletion services, visit www.e-cycle.com.

Businesses Request a Quote Button

 

January 20, 2012No Comments

Preventing Mobile Phone Data Security Loss on Employee-Owned Devices—Three Tips for Businesses | e-Cycle

Based on a blog written by Jason Fell, a technology editor at Entrepreneur.com. 

While being able to do business with a colleague at all hours of the day may seem like a cost effective strategy, businesses today need to realize the risk they run by allowing employees to access corporate information on their personal mobile devices. Sensitive data such as emails, business contacts, customer data and network login credentials can be threatened by the use of personal devices.

So what can be done to ensure a business’s data is secure when it leaves the office? Take a look at the following tips to create a data security plan for your company:

1)   Teach employees how to prevent a data security breech.

Taking simple measures like using passwords, updating operating systems and learning to clear data from a lost or stolen device will prevent many of the basic problems companies face.  Show them how to do it and remind them to do it often to ensure data security is always a top priority.

2)   Make the tools readily available.

Implementing this can be as easy as sending out a basic “How-to” flyer or holding occasional meetings focusing on data security.  Stress the fact that data security protects them as well as the business.

3)   Don't keep sensitive data on personal devices.

The important factor to remember here is that the personal device does not belong to the company, and therefore cannot be taken from the employee.  Do not allow tools like email or customer data to be stored locally onto the device. This way, it is easier to protect corporate data if necessary.

Businesses Request a Quote Button

 

 

January 13, 2012No Comments

How To Create a Recycling Plan For Wireless Gadgets | e-Cycle

Wireless technologies, such as smartphones and tablets, have become essential tools for leading enterprises. But what happens to these invaluable tools when it’s time for new technology? Often, a startling transformation occurs: in just one day, a device which was once so critical is simply cast aside as “obsolete” and “worthless.” As an IT solution provider, implementing a responsible mobile buyback and recycling program can be one of the easiest and most rewarding IT cost-cutting solutions you can offer your clients.

More than 150 million mobile phones are retired in the U.S. each year, but less than 20 percent are reused or recycled. Pollutants from electronic devices now represent 70 percent of the toxins in our landfills. In fact, one mobile phone in a landfill can contaminate up to 40,000 gallons of water.

However, more than 50 percent of mobile devices still retain a significant resale value, even after 18 to 24 months of use, and can be reused in secondary markets where the technologies are valued and needed. Every organization should have an asset recovery plan in place to recoup this revenue to help offset the cost of supplying their workforce with the latest technologies.

But what is a “responsible” mobile buyback and recycling program for electronic gadgets? It is a program that ensures you maximize the return on your customer’s wireless investments while protecting their sensitive corporate data. It uses wireless recycling partners that are e-Stewards Certified and continually audited to ensure proper data security, hazardous e-waste disposal and worker protection through the entire downstream recycling chain to final disposition. With these safeguards in place, you can help your clients advance their sustainability initiatives while protecting their private data and their bottom lines.

Here are some tips for maintaining a sustainable, secure and profitable mobile phone reuse and recycling program

1. Work with e-Stewards, such as certified mobile buyback and recycling companies. Our company was calling on an extremely large U.S. financial institution whose representative said that they already had a buyback and recycling solution in place through an “approved vendor.” Having never heard of the vendor, we decided to research the company.

After further investigation, we discovered that the vendor was actually a residential address using an unsecure, open garage to collect and refurbish mobile devices to sell on eBay. Toxic batteries and parts were being stored, discarded and shipped in unlawful and unethical manners. Needless to say, the institution immediately ceased all business activities with the vendor.

Before choosing a mobile buyback or asset recovery partner, make certain that they are e-Stewards Certified. Be wary of any recycling vendor that is vague about their recycling process and downstream partners. You should expect complete transparency and documentation of all business practices.

2. Mobile data security isn’t just restoring the factory settings.There are several mobile buyback and recycling Web sites, especially those with consumer-driven divisions, claiming “complete data deletion.” However, if you take the time to read the fine print in their terms and conditions, most will state that they take no responsibility for deleting the private data.

But there is much more to data security than simply restoring the factory settings on a device. When choosing a recycling partner, you need to examine their device-specific deletion methods, quality assurance testing practices, third-party verification audits, facility security, hiring policies, liability insurance coverage, and other procedures.

3. Do not trust your employees or third-party software with data deletion. It is a great advantage if your client has the resources to invest in remote data wiping solutions. However, even after resetting a device to factory settings, there are still applications and hidden menus that may still contain data, including owner contact information, passwords and pin numbers. Human error happens. Be certain your mobile buyback company has rigorous processes in place to permanently remove the data on every device as well as secondary quality assurance testing.

4. Make certain carrier services are canceled prior to reselling or recycling devices. Accidentally retiring devices that still have active service plans is a serious security risk due to continued data transmissions. It also often results substantial financial losses due to unnecessary carrier service charges. In the case of one of our large financial clients, it resulted in a loss of tens of thousands of dollars per year. Be sure your chosen wireless recycling company includes active phone line testing as part of their services and that they provide a complete list of devices (with phone numbers) that are found active.

5. A “destroy only” policy is bad for the environment and your budget. Corporate-liable devices that are not properly retired—stored in closets and desk drawers, directly donated to charities, trade-in programs or simply given to the employees—may expose confidential data. In an effort to battle security threats, some companies develop a mobile ‘destroy-only’ policy.

This physical destruction of reusable devices results in lost revenues, additional disposal expenses, energy waste and increased greenhouse gas emissions. It also denies bootstrapping entrepreneurs throughout the world the opportunity to reuse these technologies to build their businesses. Secure wireless reuse is great business.

6. Use mobile buyback as part of your corporate caring plan. Mobile asset recovery offers a viable alternative to traditional charitable donations and sponsorships. Your clients can choose to use a portion or all of their revenues as a tax-deductible charitable contribution.

For example, one of our large financial clients contributed more than $44,000 to a local hospital this year by donating a portion of their buyback proceeds. Additionally, a leading non-profit hospital raised more than $40,000 for two charities, including a local food bank. Half of the revenues from their mobile devices provided more than 60,000 meals for hungry families this year alone, and without impacting their budget.

7. Measure the environmental impact and celebrate your success. Have your wireless recycling partner provide you with annual environmental impact statements that measure the positive impact of your reuse and recycling programs. Report and celebrate the success with your clients.

Businesses Request a Quote Button

 

December 20, 2011No Comments

Reducing the Security Risks of Employee-Owned Smartphones and Wireless Devices | e-Cycle

Employee-owned devices are becoming challenging to enterprise mobile security policies however there are a number of ways to control these ever-growing wireless security issues. Two of the most important factors to consider when moderating the security risks of employees’ personally owned devices are what level of support your company is willing to offer associates with non-company-owned devices and how these devices will access data.

There are several different approaches businesses take when dealing with the security of these mobile phones. Many organizations allow their employees to access email on their personally owned devices. Because most smartphones have active sync capabilities, these devices can be easily configured by the end user and the process requests a fairly low level of support. In other organizations, employees are permitted access to additional business data on their wireless devices however they are not provided with technical support through the IT department. Yet another option that businesses offer is full data access with a full level of IT support.

The varying methods of data access may also determine the level of IT support. When employees require a higher level of support, such as client/data server access, businesses may prefer that employees utilize company-owned and supported devices. However, an associate using a web portal on their mobile device to retrieve business data requires a much lower level of support because this system lacks complex software running on the end user’s device. In this situation an employee-owned device may be the appropriate choice.

Though data security is always a challenge with small businesses, understanding your options will help to keep employee-owned devices protected. The development of mobile VPN created the opportunity for simple implementation of mobile security options. Tools such as, device lock as well as lost and stolen phone tracking capabilities, are essential for today’s mobile enterprise security. Utilization of a Microsoft Exchange email server enables the opportunity for password protection, requiring end users to enter a password before accessing their email. This facilitates mobile phone security enforcement through the cloud. In the event that an employee leaves your organization, the Exchange server allows an email account to be easily removed from an employee’s mobile device by eliminating their access to the corporate email account – including all stored mailbox data. Revoking an employee’s credentials upon the severing of the employee relationship will discontinue their ability to login to the company server.

Businesses and organizations, both large and small, are making the transition to employee-owned devices. By making this switch, companies are eliminating the associated mobile phone expenses however they need to be aware of the potential issues that could arise from these personally owned devices. Most importantly, business owners need to establish a mobile security policy that includes password protection for the sensitive data contained within these wireless devices. These steps ensure that if a smartphone or tablet is lost or stolen, the company’s confidential information will remain protected. These devices were designed to increase worker productivity not cause extra stress, so offering employees technical support for their personally owned devices will keep them working efficiently and prevents aggravation with these technologies.

For more information or to view the full story How to Reduce Smartphone Security Risks at http://www.consumerelectronicsnet.com/article/How-to-Reduce-Smartphone-Security-Risks-1773667.

e-Cycle provides enterprises with secure end-of-life mobile phone asset recovery and recycling
Trusted by more than 7,000 organizations nationwide, including some of the largest companies in the world, e-Cycle delivers industry leading data deletion services to eradicate and protect sensitive data on your businesses’ used wireless devices. Our high-security work environment and processes have been meticulously designed to maintain the utmost protection of your confidential information. e-Cycle not only provides a rigorous, end-of-life data security process but also offers our clients a complimentary mobile phone recycling and wireless buyback services. To find out more on e-Cycle’s mobile phone asset recovery, recycling, and data deletion services, visit www.e-cycle.com.

Businesses Request a Quote Button

 

December 14, 2011No Comments

Business Mobile Phone Buyback and Recycling Company 
e-Cycle ranked the #68 Most Promising Company in America

Forbes recognizes Central Ohio wireless recycling company on its top 100 list of America’s most promising privately held companies

Forbes ranked e-Cycle LLC #68 on its annual list America’s Most Promising Companies. One of only three Ohio companies to appear on this prestigious list, e-Cycle was the only company from Central Ohio to receive a ranking.

Forbes‘ America’s Most Promising Companies list features 100 privately held up-and-comers with compelling business models, strong management teams, notable customers, strategic partners and precious investment capital.

“Sizing up younger, privately held companies is hard: Their fortunes can change very quickly and there’s a dearth of public data,” says Forbes Executive Editor Brett Nelson. “We took a more comprehensive approach to evaluate their health and potential.”
To sharpen its search, Forbes teamed up with CB Insights, a Manhattan-based data firm that tracks investment in high-growth private companies. With $650,000 in grants from the National Science Foundation, CB has developed complex software called Mosaic that mines myriad online sources (from press releases and social networks to job boards and court filings) to come up with one, algorithmically derived score that measures a private company’s health. Forbes married Mosaic’s data-crunching with old-fashioned reporting to assemble a list of rising stars with bright growth prospects. To view the complete the list, please visit www.forbes.com/ampc.

e-Cycle is the leading provider of wireless buyback, data deletion and recycling services for businesses and major organizations. The company achieved 558 percent business growth between 2007 and 2010 and created more than 75 green jobs at its Ohio headquarters.
“We are thrilled to be recognized by Forbes this year. I am extremely proud of the hard work and dedication of the entire e-Cycle team to provide unparalleled service for our clients,” said Christopher Irion, founder and CEO of e-Cycle. “Our continued success, however, would not be possible without the growing commitment to responsible e-waste reuse, recycling, and data security by the organizations that we serve. We applaud their environmental stewardship and thank them for their continued trust.”

About e-Cycle
Ranked the #5 fastest growing, privately held environmental services company by Inc., e-Cycle helps organizations take a more responsible, secure and profitable approach to wireless mobile phone recycling. e-Cycle collects used mobile devices from businesses and major organizations, reimbursing them for devices that retain value and recycling all others at no charge. The information on every phone is either deleted or destroyed through the industry’s most rigorous data security measures. e-Cycle’s clients include financial institutions, healthcare organizations, government agencies, educational institutions, and technology companies, among others. Since it’s founding in 2005, e-Cycle has purchased more than $13 million worth of retired mobile phones and recycled more than eight million wireless devices. For more information, visit www.e-Cycle.com.

Businesses Request a Quote Button

 

November 15, 2011No Comments

Mobile Phone ‘Destroy-Only’ Policies – Bad for business, the environment and your bottom line | e-Cycle

In an effort to battle ever-increasing mobile security threats, many companies choose to develop an end-of-life electronic ‘destroy-only’ policy to combat these issues and ensure that their confidential information remains secure. Data deletion and asset recovery, however, offer alternative options that are both environmentally friendly and cost effective.

Physical destruction of mobile devices not only requires additional destruction and disposal expenses but also contributes to the growing issue of electronic waste. Since most smartphones retain 50% or more of their retail value even after 18 months of use, developing an asset recovery program within your organization will put money into your telecom budget and allow for upgrades to the newest mobile technology.

Asset recovery and recycling companies will purchase your functioning devices and prepare them for reuse in secondary markets. According to the EPA, reusing an electronic device saves up to 20 times more energy than recycling alone. Reusable mobile phones and devices purchased by an asset recovery company are sent through data removal process to permanently delete private information. Devices that do not still retain resale value are shredded and the materials recycled in an eco-friendly manner.

If your company policies prevent your organization from receiving a check back for your wireless devices, inquire with an asset recovery organization on alternative options for payment. Monthly bill payments can often be made directly to your wireless carrier. With ever increasing budget constraints, mobile phone buyback also offers a creative way to raise money for the charity of your choice. Your company can raise money through a mobile buyback program and a check can be written directly to the charity on your behalf.

With electronic waste representing 70% of the toxins in our landfills, it is imperative that organizations put policies in place to address this crucial growing issue. Mobile data security is a serious concern, but a destroy-only policy wastes energy and new revenue opportunities. Studies have shown that extending the service life of the phone from one to four years decreases the environmental impacts by about 40%. Recycling and reuse of your organization’s mobile phones will ensure a safe and sustainable end-of-cycle program that keeps the toxic materials inside of wireless phones out of landfills and ensures your sensitive data remains secure.

e-Cycle’s Mobile Phone Asset Recovery, Recycling and Data Security Solutions
e-Cycle delivers solutions for the security and sustainability issues that encompass end-of-life mobile phone procedures.  e-Cycle will purchase your used, functioning mobile devices that still retain resale value as well as delete all private data and recycle non-reusable devices at no charge. Our rigorous of data security process provides our customers with peace of mind that their confidential company information will remain secure. With a zero landfill policy, e-Cycle shreds all devices that cannot be reused and the materials are recycled in an ISO Certified, EPA-registered recycling facility.

For more information, visit www.e-Cycle.com or contact gogreen@e-Cycle.com or (877) 215-5255.

Businesses Request a Quote Button

 

October 14, 2011No Comments

Mobile Phone Recycling Raises $44k for Levine Children’s Hospital | e-Cycle

Mobile phone buyback and recycling company e-Cycle collaborates with prominent financial institution to donate more than $44 thousand dollars for Charlotte Hospital
e-Cycle LLC, a wireless asset recovery and recycling company based in Columbus, Ohio, made an anonymous donation of $44,687 to Levine Children’s Hospital on behalf of a prominent financial intuition yesterday. Partnering with e-Cycle, the organization raised the funds for this charitable contribution through a mobile recycling program.

The check was presented to Mark Griffith with Carolinas HealthCare Foundation during the Levine Children’s Hospital Charity Golf Tournament at the Old Sycamore Golf Plantation. e-Cycle purchased and recycled thousands of used mobile devices from the anonymous institution and was asked to donate the revenues to the hospital.

“We are honored to benefit from e-Cycle’s generosity,” said Mark Griffith with Carolinas HealthCare Foundation.  “Thanks to the continuing support of great companies like e-Cycle, Levine Children’s Hospital is able to provide the absolute best medical care to children and families, close to home.”

According to e-Cycle founder and CEO Chris Irion, many of e-Cycle’s enterprise clients are seeking new, inventive ways to give back to the community. He said that wireless recycling offers a convenient and rewarding way to raise money for charity while protecting the environment as well as the company bottom line.

To learn more about cell phone recycling for charity, visit www.e-Cycle.com.

About Levine Children’s Hospital
Levine Children’s Hospital is a 234-bed hospital in Charlotte, North Carolina, located on the main campus of Carolinas Medical Center. Since opening in December 2007, the hospital has grown to include more than 30 pediatric specialties and has already received national distinction by U.S. News & World Report as one of “America’s Best Children’s Hospitals” for treatment of kidney disorders. Learn more at http://www.levinechildrenshospital.org.

About e-Cycle LLC
Ranked the #5 fastest growing environmental services company in the U.S. by Inc. 500|5000, e-Cycle helps organizations take a more responsible, secure and profitable approach to wireless recycling. e-Cycle buys used iPhones, BlackBerrys, smartphones, iPads and other cell phones that still retain value and recycles all others at no charge through an EPA-registered facility. The company has a 100 percent zero landfill policy. The information on every device is either deleted or destroyed through rigorous mobile security measures.

Businesses Request a Quote Button

 

October 13, 2011No Comments

Mobile Phone Buyback and Recycling Company e-Cycle Ranked 3rd Fastest Growing Company in Central Ohio

Recycler of used cell phones recognized after achieving more than 200 percent revenue growth and creating green jobs

e-Cycle has been named the 3rd fastest growing company in Central Ohio by Columbus Business First on the publication’s annual Fast 50 list which recognizes top performing businesses over the last three years. This is the second year e-Cycle has been recognized in the Fast Fifty, placing #14 in 2010.

A leading provider of cell phone buyback, data protection and recycling, Columbus-based e-Cycle was named to the list after growing its revenue by more than 400 percent since 2007. This year’s winners and final rankings were revealed at the 16th Annual Fast 50 Luncheon and Awards ceremony on October 12th. Fast 50 nominees must be headquartered in Central Ohio and be privately held, for-profit companies that have accrued at least $1 million in revenue per year over the last three years.

“The entire e-Cycle team is thrilled to have achieved this ranking in Central Ohio,” said Chris Irion, founder and chief executive officer of e-Cycle. “We could not have achieved this growth without acquiring the exceptional group of dedicated, passionate employees that we have in place today and the environmental-stewardship of our enterprise clients. It is an exciting time for our company, especially as an environmental services organization, and we look forward to expanding our operations in 2012.”

Irion recently won the Ernst & Young Entrepreneur of the Year award for the South Central Ohio/Kentucky region and will compete for the national award on November 12 in Palm Springs, California.

About e-Cycle
Ranked the #5 fastest growing environmental services company in the U.S. by Inc. 500|5000, e-Cycle helps organizations take a more responsible, secure and cost-effective approach to wireless recycling. The company collects wireless phones from businesses and major organizations, reimbursing them for devices that retain value and recycling all others at no charge through an ISO Certified, EPA-registered facility. The company has a zero landfill policy. The information on every phone is either deleted or destroyed through the industry’s most rigorous data security measures. e-Cycle is the market share leader among the Fortune 1000, serving financial institutions, manufacturers, healthcare organizations, government agencies, educational institutions, and technology companies, among others.

Visit www.e-Cycle.com or contact gogreen@e-Cycle.com or (877) 215-5255.

Businesses Request a Quote Button

 

October 12, 2011No Comments

Tips to Actively Prevent Corporate Mobile Security Attacks | e-Cycle

As threats to mobile data security become more common each day, businesses and organizations have a major responsibility to protect sensitive corporate data. To prevent company information from being compromised, businesses need to take a proactive approach to this growing issue and ensure their confidential information remains secure.

Cybercrime has become a lucrative business and is no longer limited to individual hackers. These criminals will use advanced, undetectable methods to steal data and wreak havoc on corporate networks. Many corporations are taking an “if it’s not broke, don’t fix it” approach to mobile security. While enforcing current mobile security protocols is an essential first step to the process, company mobile security procedures need to be reexamined and adapted to manage emerging trends.

When creating or modifying mobile security policies, companies need to consider not only the authentication of devices but also how devices are used outside of the corporate network. Another important factor businesses need to take into account is the accessibility of these devices to third parties such as employee family or friends. Overlooking any of these circumstances can lead to instances of inadvertent compromising of confidential company information.

Social Media has also become a big issue for mobile security threats. Not only does this media produce direct risks such as malicious links, these news feeds cause unintentional dangers as well. Social media has caused a cultural evolution in how our society communicates both on a personal and corporate level. While posts to Facebook and Twitter may not cause an immediate mobile threat, the analysis of various feeds could allow a hacker to track a users location or find weakness in a corporate network.

While social media provides unique marketing tools, it also provides an opportunity for security breach. Employees can unintentionally leak confidential company information through social media outlets. Companies need to develop a corporate procedure for social media etiquette and incorporate this into employee training to encourage proper online conduct. It is essential for businesses not only to implement security protocols but also help employees understand why it is crucial to implement them. Educating employees on current trends and increasing mobile threats will help prevent against security breaches.

The use of cloud computing is creating a large mobile security concern as well. When confidential company data is outsourced to third party vendors, businesses need to be aware of data management and accessibility. Organizations need to know their partner, understand their partner’s privacy policy and ensure it is being enforced.

Despite these and other security risks on mobile devices, the security initiatives are at the beginning stages. Corporate policies need to be modified so they apply to new and expanding technologies. Waiting to change these policies until there is an issue is a risk that companies cannot afford to take. Reviewing existing business procedures, consolidating IT infrastructure and implementing educational sessions among employees will all provide a level of defense to protect businesses from mobile security threats.

For more information view the full story Common oversights in enterprise data security by Kevin Kwang at http://www.zdnetasia.com/common-oversights-in-enterprise-data-security-62302289.htm.

e-Cycle provides secure end-of-life mobile phone asset recovery and recycling for businesses
Mobile phone security is becomes more tempting to hackers and cyber criminals everyday. Trusted by more than 7,000 organizations nationwide, including some of the largest companies in the world, e-Cycle not only provides complimentary mobile phone recycling and wireless device buyback services to businesses but also provides these organizations peace of mind through rigorous, end-of-life data security processes. To find out more on e-Cycle’s mobile phone asset recovery, recycling, and data deletion services, visit www.e-cycle.com.

Businesses Request a Quote Button

 

Let's start a conversation! Email us today.

1.877.215.5255

©2020 — e-Cycle. All rights reserved.
Designated trademarks and brands are the property of their respective owners. e-Cycle is not affiliated with the manufacturers of the items available for cash buyback.

Privacy Policy | Terms & Conditions | Site Map