GCInfotech is your total business IT solutions resource for your Mobile Workforce

Every year in the US alone over 100 million cell phones are retired, disposed and/or replaced. It’s estimated that Americans swap cell phones every 18 months on average, tossing their old cell phones into a drawer or worse yet, into the waste stream. Aside from the imminent risk of identity theft or private information going public, cell phones contain many hazardous materials that if improperly disposed can be harmful to the environment.

Consider two environmentally responsible and humanitarian alternatives for cell phone disposal: recycle or donate. The EPA claims that for every million cell phones recycled, we can recover 35 thousand pounds of copper, 772 pounds of silver, 75 pounds of gold, and 33 pounds of palladium. If not recycle, then donate to one of the numerous organizations that exist for refurbishment and redistribution that offer a potential second life before disposal (see below for a list of donation programs). For years, GCInfotech accepted old phones and made donations on behalf of its clients to organizations such as Cell Phones for Soldiers.

It’s extremely important to take proper precautions to wipe your phone of data and restore it to its factory settings before recycling or donating. Manually deleting text messages, call records and contact lists isn’t nearly enough to combat unauthorized use or protect your personal information once the phone is gone. Wiping it clean of all data may be harder than you think.

Here are details for how to do it:

  1. Remove SIM card
  2. Remove memory card
  3. Perform a master reset, often referred to in the phone’s settings as “Factory data reset” or “Wipe Handheld” (Check the phone’s manual or the internet for specific instructions regarding your phone’s make and model. The reset process is not the same for all phones.)
  4. Check with your carrier to make sure your account has been terminated. If not, others may still be able to use the device, and on your dollar. If you’re maintaining the same account, activating a new device and deactivating the old one, check your bill carefully to determine that the old device is not somehow still using that account.

Contact GCInfotech today if you have any questions about what to do with your old cell phones, or if you have any other technology concerns that we may help you with.

Cell Phone Donation Programs:

American Cellular Donation Organization Cell Phones for Soldiers
Charitable Recycling Program CollectiveGood
Donate a Phone Call to Protect Good Deed Foundation
Recellular Inc. Recycle for Breast Cancer
RMS Communications Group, Inc. Wireless Foundation
Earth911 Sprint Project Connect
Verizon Wireless HopeLine AT&T Wireless
GCInfotech is your total business IT solutions resource for your Mobile Workforce

How Smart is your Smartphone?

The smartphone continues to revolutionize the business world as new and innovative phones flood the market and slick apps make it easier to do business around the clock, from anywhere. From a profitability and productivity standpoint, the business enhancing affects are unquestionable. But with this rapid progression in smartphone technology come new mobile security challenges that not only CIOs and IT staff need to think about, but also small business owners and managers. Smart phones can be open portals to sensitive personal information and your corporate network making it absolutely crucial to understand the mobile security risks and how to maintain the integrity of your data.

GCInfotech’s Cory Visi adds, “Like laptops, smartphones are an extension of your corporation’s network not only containing sensitive or confidential data, but through VPN capabilities it can allow direct connectivity to the heart of your company’s business. It is imperative for the network administrator to view smartphones the same as employee laptops, and to apply the same (if not greater) precautions and access levels restricting access to the corporate network.”

36% of business network attacks originate from end-user devices, and according to the 2010 Data Breach study
28% of attacks occur through the various social networks that employees enjoy on their smartphones

Monitoring these types of activities and deploying a mobile device use policy will go a long way in securing sensitive company data that travels between the company network and employee smartphones. With volume of apps available, and with the rate at which they enter the market, it’s understandable that not all apps are vetted before they’re available for download. This is a huge source of vulnerability and an increasingly inviting platform for malicious criminal activity that can have devastating effects on your business. Policy should define and restrict which smartphones may be used on a corporate network.  If the phone does not support features such as password protection, or remote-wipe (ability to remotely erase the phone if lost) for example, it should not be allowed to access company data.

If you already have one or plan to deploy a business smartphone to your workforce, give some thought to the following:

  • Education. Make your employees aware of how their smartphone interacts with your network.
  • Create and strictly enforce a use policy, and ensure that security apps are included in said policy.
  • Understand that not all smartphones operate on the same platform. Phone software packages have holes and no carrier is immune to malware and viruses. Learn about the various vulnerabilities and safeguards of the smartphone options you’re considering.
  • Require employees to sync their phones regularly, keeping sensitive data off of their phones.
  • Maintain a corporate firewall and regularly monitor all server activity.
  • Limit employee permissions to only what they need to get their job done.
  • Have authentication protocols in place for accessing corporate networks.
  • Keep malware definitions up to date and running on all security software.

GCInfotech will help you maintain the integrity of your corporate network and mission-critical data. If you have any questions or concerns regarding how to develop a strategy for mobile phone security in your company, give us a call.