Are You Risking A Security Breach?

How well is your sensitive information protected after you sell your technology?

                                                                                                                    Thinkstock Image

When did using technology start becoming less helpful and more of a hassle? It seems like technology life cycles are becoming shorter and shorter, forcing you to upgrade more often. Sometimes forced upgrades make sense, however there are more cost-effective solutions at your disposal.

When opportunities like this arise that call for new upgrades and projects, IT pros have found the secondary market to be extremely beneficial for implementing solutions while maximizing budget spend. Buying used equipment is a low-risk solution that can save you lots of money and can be applied towards other high-value projects.

Today’s networks extend beyond traditional designs, including data centers, mobile devices, and cloud services. In the healthcare industry especially, more patient information is being stored and exchanged using electronic medical records (EMR) systems. With so many devices storing sensitive patient information, and federal security mandates looming over your every decision, now more than ever it’s vital to protect yourself while getting the technology you need to keep your healthcare facility running at peak performance.

In an era when data breaches are the new norm and new threats emerge rapidly, some might be hesitant when it comes to buying legacy technology. Recently, one of the nation’s largest health insurance companies, Anthem, suffered a massive data breach where millions of customers’ information was compromised. According to an article from USA Today, “The hackers gained access to Anthem's computer system and got information including names, birthdays, medical IDs, Social Security numbers, street addresses, e-mail addresses and employment information, including income data.” This is yet another example of why IT security must be recognized as a business issue, not just a technical one.

Buying Used Equipment

When leasing or buying used technology from the secondary market, it’s imperative that you are purchasing equipment from reputable resellers. Not only will this process protect your investment, but it will safeguard your reputation and your clients as well.

Make sure that your provider has a deep understanding of your unique issues and technology challenges and constantly stays up-to-date on all requirements and mandates. Instead of upselling to new technology you don’t need, this solution will help you maximize efficiency while reducing overhead costs.

Selling Used Equipment

Even after you’ve upgraded, your used technology might have some life left to it. It just makes sense to sell it to someone who can extend its life cycle and truly reap its benefits. But before you sell your old equipment to a secondary market vendor, make sure to consider the following questions:

  • How long has the vendor been in business?
  • Does the vendor have a legitimate reputation in providing information technology services?
  • Is this a trusted source? Do they offer a guarantee that your data will be wiped clean so that it won’t fall into the wrong hands?
  • Do they factory reset the technology to erase any prior configurations containing sensitive information?

It’s important to choose your vendors wisely, as they greatly contribute to your success. Make sure you choose someone that will help protect your organization from litigation or security breaches when selling your equipment.