The 5 Myths of Donating IT Equipment

Donating IT equipment is a bad idea. It is always better to have a professional IT asset disposition company process the materials and send you a check, which in turn you can keep or donate. Here are the top five myths related to donating retired IT assets.

MYTH #1 – You are “helping the organization”
Actually receiving IT equipment via donation may cause other issues, such as equipment storage issues, getting the wrong equipment for the job, and a potentially a true knowledge gap of what to do with the hardware.

MYTH #2 – You are getting the most for your donation
If your retired IT equipment has value, it is better to have a professional ITAD company like CCNY Tech process the material and give you funds that you can donate to your charity of choice.

MYTH #3 You are getting the most PR by donating used hardware
It’s always more “Press Worthy” to make a cash donation to a cause rather than a lot of used equipment. The usefulness of the funds to the charity is usually much more preferred and respected. B esides, wouldn’t a picture of you handing a charity a check look better than your donation of Used IT equipment?

MYTH #4 You are maximizing your tax benefit
Many organizations don’t realize that the equipment that they are sitting on has value beyond what they anticipate. Infact, it is much more easy to justify a receipt for a cash donation rather than donations of goods in an Audit.

MYTH #5 – My assets will be handled responsibly
Research has found that donated hardware often falls into the wrong hands or into the waste stream, causing unwanted environmental hazards and potential fines for the organization.

About CCNY Tech
CCNY Tech is a systems integrator, reseller and certified electronics waste recycler of IT networking & security hardware. CCNY Tech has the knowledge and product base to increase the security posture and enhance the efficiency of your network. They have been able to design, configure and implement custom solutions to fit our customer’s network architecture using the latest hardware based technologies. If you have any questions, give our team a call at 315-724-2209, or visit our website at ccnytech.com.

Becoming Efficient with IT Asset Management

IT administration is becoming increasingly more relevant to companies of all industries. Properly evaluating and managing systems can help you to stay efficient and avoid unnecessary asset purchases. Small to medium-sized businesses, in particular, struggle with IT asset management. Limited budgets and staff make it difficult to identify what is redundant and what is lacking.

Understanding the IT asset lifecycle can be key to keeping an effective IT infrastructure. It is important to understand how all of your equipment works together, works for your company, and where it is in its working life. Using software to track data and keep records of both the maintenance data and financial data is crucial.

Implementing a centralized system of organized records can help you to make strategic decisions about your IT and help you to avoid needless maintenance expenses. IT asset management has numerous benefits and has a direct impact on lowering hardware and software spending. Having better control over the IT asset lifecycle also helps businesses improve efficiency and reliability.

Well-executed IT asset management is a worthwhile business initiative. It is not only a way to track machines and software, but it also helps you to create a long-term plan and gain a better understanding of your infrastructure and inventory. It allows you to make more informed decisions and design better processes. You can create a strategy that works for your business.

Essentially, IT asset management works together to help you calculate risk. Age of assets, leasing periods, warranty expirations, software licenses – all of this information should be collected and tracked throughout an asset’s life to keep your company in sync with your valuable IT assets.

When you create a centralized and sharable system, you can keep your whole team on the same page. This can be done through an electronic inventory management system. By recording information such as contracts, locations, costs, and disposal, you are taking the guess work out of your IT.

Furthermore, old and outdated software and equipment is probably costing you more than you know. Having a centralized system can keep you aware of necessary maintenance, updates, and upgrades. A clear view of all of your hardware and software assets can result in greater productivity and reduced repair costs.

Managing and protecting your investments is not a simple task but is certainly worth the time. You must identify and evaluate your assets regularly and put the time into proper maintenance. Setting up the right policies and procedures may seem overwhelming, but in an IT world, it can keep you competitive.

IT forecasts and budgets are essential to any company. Businesses of all sizes are constantly trying to cut costs and improve efficiency. Having a clear understanding of where your IT infrastructure is and where it will need to be plays an enormous role in the success of your business. IT asset management is a key to evaluating and improving your overall IT investment.

CCNY Tech is an IT sales and services company. For over 25 years, CCNY Tech has been supplying IT equipment as well as providing maintenance and IT recycling services. Partnering with some of the top brands in the industry, they are experts in equipment and custom configurations. CCNY Tech IT professionals provides custom solutions to businesses of all sizes. Learn more at ccnytech.com.

The Best Ways to Get Rid of Unwanted Data

The data that you store is likely very important. It can contain sensitive company and customer information, as well as information with profitable potential. Businesses in particular are constantly store and saving mission critical files, databases, and documents. The problem is, a lot of the data we store can quickly become obsolete or redundant. And all of this data takes up a ton of space and can even bog down your systems. You may go through and regularly delete old or confidential files, as you should, but is it ever truly deleted? 

This article will serve as a guide to help you truly destroy unwanted data, rather than just hiding it and leaving it vulnerable.

One solution, depending on the sensitivity of the information, is to destroy the hardware on which it is stored. When data is absolutely confidential, it may be best to store it on a hard drive that can then be physically destroyed when the information is no longer needed. Here is a link to a number of effective ways to destroy hard drives:

 

Another solution, if you’re not crazy about the idea of destroying hardware, is to save the information you would like to keep in a separate location, and then simply wipe the drive of everything else. There are different methods of wiping drives depending on the operating system, but they are all fairly straight forward. Doing this will return your drive to its original settings and remove all traces of data that were once there. You can then re-download the data you wish to keep.

Our recommended solution would be to use a professional IT services company for Data Destruction. This is usually a sub-service of IT Asset Disposition (ITAD). ITAD is the removal and disposal of all old, unwanted, or obsolete hardware and data.

While there are many important aspects of IT Asset Disposition, arguably the most important is the protection of sensitive data. Proprietary information, personal customer data, and other forms of data that need to remain confidential are under constant threat from cyber criminals. Time after time, there is yet another company making headlines for a breach in their network resulting in critical data being compromised and ending up in the wrong hands. The stories of sophisticated, coordinated attacks are all too familiar for any systems administrator, but there is a much simpler way for breaches to occur that may be overlooked; a hard drive containing this sensitive material is physically stolen.

Our on-site data destruction ensures that company and customer data will never leave your facility. Any privacy and security concerns can be addressed with proper data destruction of your hardware and software. Our team is sure to erase and destroy retired data to prevent security leaks and to free up your resources.

Check out this video about ITAD!

Or call us at (315) 724-2209 and ask to speak to our ITAD expert!

4 Myths About Buying Refurbished IT

While buying refurbished IT can mean amazing savings, it tends to carry a negative connotation. It’s as if “refurbished” somehow equals inferior or outdated. However, this article will reveal 4 myths about refurbished IT and may help change the idea that it is “worse than” buying new. The good news is, finding a cost-effective solution doesn’t have to mean getting burned by a faulty item.

Myth #1: Refurbished hardware is or was defective

A common myth is that all refurbished hardware was once defective. However, anyone who has ever worked in retail, or even returned something to a store, knows that is not the case. Many retailers offer a grace period for returns. Electronics in particular are often allowed a 30 day return policy. The reason for most returns is not related to a defect, but to buyer’s remorse, finding a better price, or disinterest in the product.

Products may also be labeled as refurbished for being overstocked when the next generation is released, or being a demo unit in a storeroom or tradeshow. Occasionally a product may become refurbished due to minor exterior damage from shipping. While this can be a deterrent to some, it’s actually a great way to save money on a fully functioning machine.

This is not to say that products are never returned because of defects, or even that all refurbished products are worth buying. However, when you buy from a trusted company, refurbished is a great way to find new and like-new items at much lower costs. After all, IT equipment may be marked “refurbished” simply for being opened, though generally the phrase new in box is often used.

Even when a product has a defect, it is not resold that way by a reputable company. A true refurbishing company will have engineers to diagnose, rebuild, and replace parts before putting them back on the market. They are thoroughly tested and verified and will be just like new. Finding a reputable and authorized dealer means quality assurance and restoration, as well as receiving products and parts direct from the manufacturer.

Myth #2: Refurbished equipment has no guarantee

Manufacturers and authorized dealers will most often guarantee their refurbished products. A warrantee can vary but a 90 day warranty is fairly standard with the purchase of a refurbished product. Most companies will also offer further protection with extended warranties. If your refurbished product were to fail, you are guaranteed either replacement, repair, or your money back. This will generally cover all shipping fees and part replacements, as well as labor for any repairs. An extended warranty is a great way to go when buying refurbished. It protects you from possible problems and is more often still less expensive than buying non-refurbished.

Myth #3: Refurbished PCs do not come with a Windows license

A refurbished PC may meet with Microsoft Windows licensing requirements, depending on whom you purchase from. If you purchase a refurbished PC from a third party, it may already have programs or operating systems installed – with this, you must also be careful to avoid a software piracy situation. It is much safer to purchase from a reputable and authorized company.

A new Windows license is not required for a refurbished PC when it has the original recovery media or disk based recovery image associated with that PC. If it has the original Certificate of Authenticity for a Windows operating system, you don’t need to purchase one. A Windows license must be purchased if it does not match the other situations and you must be sure the company provides a microsoft refurb license.

Myth #4: Refurbished computers are only for public use places

While it is true that some schools and libraries lean toward refurbished, they are not exclusively for public use places. Refurbished computers are a great option for any enterprise or individual. You can find the same machines to fit your performance and storage needs and can even request custom configurations from true refurbishing companies.

CCNY Tech is an IT sales and services company. For over 25 years, CCNY Tech has been supplying IT equipment as well as providing maintenance and IT recycling services. Partnering with some of the top brands in the industry, they are experts in equipment and custom configurations. CCNY Tech IT professionals provides custom solutions to businesses of all sizes. Learn more at ccnytech.com.

On-Site Data Destruction

CCNY Tech is proud to offer on-site data destruction to our clients. Regardless of the industry of your company, nearly every disk drive containing device holds some form of data that can be considered “sensitive.” Some of your stored data may not be extremely sensitive, but what about bank statements, personal information, or even medical records? There is just certain information that needs to be completely destroyed, with no risk of that data falling into the wrong hands. This is where on-site data destruction becomes necessary.

Above all, the main reason any client would opt for on-site data destruction versus off-site is the added assurance that your company and/or customer information will never even leave your facility. When partnering with an on-site data destruction provider, you are given full transparency of the destruction process. Chain of custody concerns are also removed with on-site services. Customers can take comfort in the fact that there is no chance of the drives being mishandled during transportation resulting in a data breach.  

Data protection solutions are becoming increasingly more relevant to you and your company. If you are unfamiliar with data destruction and the whole IT Asset Disposition process, feel free to check out our website or call one of our trained ITAD experts today. We would be happy to discuss your company’s data security procedures, and to find a solution that works for you.

By Mike Buffa
CCNY Tech has a variety of ITAD related services including on site data destruction.  CCNY Tech also sell new IT equipment such as servers, networking, and storage equipment, along with custom configurations. Check out our site or call our team to learn more about our products and services! Visit Website

About ITAD Services

CCNY Tech provides a wide range of ITAD services. We serve customers in a variety of ways, throughout the lifecycle of their equipment. For some companies, we perform “cradle to grave” type services. We begin with the delivery and installation of IT equipment, we maintain it throughout its use, and we decommission and remove it at the end. The process ends in remarketing or recycling retired assets, and once again supplying new equipment or upgrades.

The 6 Step Process of ITAD Services at CCNY Tech


Receive, Tag, and Inventory Devices

ReceivingCCNY Tech will receive and record invoice information, model, configuration, MAC address (wired and Wi-Fi), and serial number into inventory spreadsheets.

 

Asset Tagging – CCNY Tech will remove each asset from its packaging and place an asset tag physically on the device. CCNY will also record asset numbers on the outside of device packaging.

 

Repack and Storage – CCNY Tech will re-pack and place device into inventory as “Ready for Deployment” and will store the asset in a designated client inventory locked cage on-site.

 

Transport – CCNY Tech will deliver the “Ready for Deployment” asset per the client’s request during the hours of 9AM to 5PM, Monday through Friday. Minimum of 10 devices per delivery.

 

Processing of Retired Assets
Refurbished Asset – CCNY will pick up retired assets per client request and fully refurbish for resale or process as E-waste if there is no resale value. All client information will be removed from each device and a DOD wipe of any hard drives will be performed.

Remarket Retired Asset – CCNY Tech will remarket assets to our customer user base to maximize returns. Each device will be processed for reuse or recycling, and all profits split with the client. As each asset is sold it will be added to a Purchase Order Report. Monies due to the client will be paid on a monthly basis with all accounts being settled up by the end of each calendar year.

If your company or organization are looking to upgrade or decommission servers, storage or networking equipment, CCNY Tech has the best solution to keep your data secure, help the environment, and perhaps make you some cash for your “no longer needed” IT gear. Give us a call at 1-800-566-4786 and speak to an IT specialist about IT Asset Disposition Services from CCNY Tech.

By Ron Pasquarelli

CCNY Tech has a variety of products from some of the top names in the industry! We supply servers, networking, and storage equipment, along with custom configurations. Check out our site or call our team to learn more about our products and services! Visit Website

Protecting Your Sensitive Data With ITAD (IT Asset Disposition)

While there are many important aspects of IT Asset Disposition, arguably the most important is the protection of sensitive data. Proprietary information, personal customer data, and other forms of data that need to remain confidential are under constant threat from cyber criminals. Time after time, there is yet another company making headlines for a breach in their network resulting in critical data being compromised and ending up in the wrong hands. The stories of sophisticated, coordinated attacks are all too familiar for any systems administrator, but there is a much simpler way for breaches to occur that may be overlooked; a hard drive containing this sensitive material is physically stolen.

When a device has outlived its usefulness, the next step is to send it off for recycling. But, what if this device still contains sensitive data? How do you assure that wherever this drive ends up, your data will not be going with it?

With this in mind, CCNY Tech is proud to unveil our new drive erasure program. Utilizing Extreme Protocol Solutions, flagship Enterprise Data Erasure Software (XErase) CCNY Tech provides high bandwidth, multi-protocol data sanitization compliant with over a dozen globally recognized erasure standards. A few of the key features of our new program include:

Tamper Proof Reporting (PDF, DATABASE)
Versatile Reporting Options (PDF, XML, CSV, TXT, DATABASE)
Over 35 Erasure and Validation Options
On the fly erasure method creation
Erase to any requirement
NIST Verification Support
SSD Erasure Support
Pre and Post Device Health Screening

XErase provided CCNY Tech the flexibility to meet the requirements of clients in a wide array of industries.  To learn more about ITAD and Removal of Sensitive Data, call us today at 1-800-566-4786 to speak with one of our reps to come up with a plan to protect your data!

Written By:  Mike Buffa, CCNY Tech


CCNY Tech has a variety of products from some of the top names in the industry! We supply servers, networking, and storage equipment, along with custom configurations. Check out our site or call our team to learn more about our products and services! Visit Website

adipiscing at Nullam ut vulputate, ut tempus dictum libero libero. mi,