Residual Data : Threats at the Tail End of Devices

2019 | ISSUE 2

Great article from The Quarterly Journal of the International Secure Information Governance & Management Association (iG Journal)

“Organizations need to define and enforce stringent IT asset management policies and protocols for proper sanitization of legacy hardware before its disposal.” 

Sunil Chandna, Founder and CEO of Stellar

Do you need assistance creating or updating your asset management policy? Contact an EWASTE+ Client Services Rep today!  888-563-1340.