IT security is not only about protecting the equipments and devices that are presently used but is also about the proper disposal of old equipments and devices.Â This is especially important in old computers since we might just be allowing threats to enter our lives.Â Hackers are known to be able to penetrate the hard drives of discarded computers to fish out sensitive, personal information.Â
To prevent this from happening, it is necessary for computer owners to make sure that no such information or any information can be retrieved in the manner.Â The best way is to destroy the hard drive physically through the use of a heavy hammer.Â Â It goes without saying that the hard drive should be removed first from the computer.Â This can be done with the proper tools or through the assistance of a computer technician.Â
The rest of the computer parts can be sent to a recycling center so that reusable components can be collected to build refurbished ones.Â The remaining unusable parts find their way to smelting centers where they can be recycled.Â This is one way of helping protect our environment.
There is no telling how personal information retrieved from old computers will be used by criminal elements.Â Hackers will be especially looking for information that can allow them to steal the identity of owners such as social security numbers, credit card numbers, and bank account numbers.Â Information of this nature in the hands of criminals can wreck havoc on a personâ€™s personal and financial life.Â Â
People often forget that equipments and devices are capable of storing data indefinitely even when they have performed certain tasks to erase them.Â Reformatting the hard drive was previously believed to be enough for the purpose but experience show that it is not.Â It always makes sense to be one step ahead of criminal minds.