SINGAPORE (June 27, 2023) – There were more than 1,800 data breaches at U.S. companies in 2022, nearly triple the number in 2010, with an average cost of more than $4.3 million. SK tes a global leader in sustainable technology services, closes off a common vector for cyberattacks: sensitive information stored on computers and devices designated for disposal, recycling, or refurbishment.
While many cyber-attacks originate from malware, ransomware, or user carelessness, organizations are also highly vulnerable to access credentials that leak into view: One study found that 59 percent of financial services companies have more than 500 passwords that never expire, and nearly 40 percent have more than 10,000 ghost users.
When companies replace technology as part of lifecycle management, those long-term passwords may be leaked and accessed by malicious actors, exposing the organization to financial losses, legal ramifications, customer distrust, and damage to its reputation.
"Many businesses are unaware of the potential exposure they incur when they recycle or refurbish their technology," said Group Chief Information Officer at SK tes. "It's essential that your partner IT lifecycle management facility employ the latest and most comprehensive security protocols."
SK tes invests in cybersecurity at all points of the IT asset disposition (ITAD) practice, preventing data leaks across the entire chain of custody. It begins with physical security in inter-location transport and continues with separate and secure storage of unprocessed assets to stop intra-site leakage. Internal security measures include camera surveillance, auditable access controls, security screening of employees, and security training.
SK tes also invests in security via its access policies and personnel practices, including:
SK tes conducts storage device sanitization through its Platinum partnership with Blancco, a recognized leader in enterprise data erasure services. As partners for 15 years, SK tes provides training for data-erasure staff, and Blancco processes are controlled to reduce variation or deviation from client-required standards.
Asset erasure is performed on the SK tes Sentinel Network - a separate, dedicated, secure network segment for processing assets and devices, and is firewalled from other SK tes corporate network segments. Blancco also supports on-site erasure for SK tes customers who select to have their equipment erased and certified at their locations before transport to SK tes facilities.
"SK tes is known and trusted worldwide for how we manage the disposition of our client's physical assets," Hebron said. "However, clients should also know that we've designed our services to protect the confidential nature of their data and to mitigate any risks to them in the asset-recovery process."
For more information, get in touch with us.