‘Out With The Old, In With The New’

Simon NewmanFor our first monthly cyber theme, we have focused on an issue that will relate to anyone who may have received a new smartphone or tablet for Christmas – what do you do with your old one? It’s an important consideration for businesses too, as they look to upgrade or replace their existing assets. Whether you sell it, give it away or recycle it, have you ever stopped to think about how much personal data your devices hold and how valuable they could be to a cyber criminal?

All technology has a shelf life. Over time, you may find that your device becomes slower as you run out of storage space or that you can’t download the latest app. You may even find that the vendor no longer supports your device.

So, what should you do with it and how can you make sure that you are not handing over all of your personal data to the wrong people?

First of all, if you are replacing your existing device, make sure that all information is thoroughly wiped. To do this, reset it to factory default settings so that anyone who uses the device in the future cannot recover anything you previously stored on it. We have recently published guidance on how to do this for devices using both Apple and Android operating systems. The National Cyber Security Centre (NCSC) also has some useful information.

If you are planning on destroying the device, consider using a company specialising in data destruction who follow recognised industry standards, such as those published by the Asset Disposal and Information Security Alliance (ADISA). These companies break each device into 6mm fragments – a jigsaw puzzle that even the most hardened cyber criminal would be reluctant to attempt.

But what about our new devices? What can we do to reduce our vulnerability to cyber crime? Start with a secure platform and it will be much easier to maintain. The following are some useful considerations to think about.

For more security news visit here.

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

NCSC stresses importance of cybersecurity

The UK’s cyber chief has recently signalled that the nation’s critical infrastructure is ‘enduring and significant’ amid a rise…
online

Strengthen your online security

After the recent statement by the National Cyber Security Centre (NCSC) calling for UK organisations to bolster online defences, digital
CAA focuses

CAA focuses on cybersecurity with introduction of ASSURE

Nettitude have announced a new accreditation with the Civil Aviation Authority (CAA) and Crest called ASSURE to provide a new cybersecurity audit model
silicon valley

UK cyber entrepreneurs meet world’s experts in Silicon Valley

An exciting mix of innovative start-ups are flying the flag for the UK at a prestigious conference on cyber security in California’s Silicon Valley
silicon valley

UK cyber entrepreneurs meet world’s experts in Silicon Valley

An exciting mix of innovative start-ups are flying the flag for the UK at a prestigious conference on cyber security in California’s Silicon Valley
UK telecoms network

New plans set to safeguard UK telecoms network

Ministers determined that UK operators should put in place additional safeguards and exclude high risk vendors from parts of the 5G telecoms network
black friday

Black Friday presents a window of opportunity for cyber criminals

Consumers can expect email-based attacks using seasonally themed lures for major shopping events such as Black Friday.
black friday cyber security

Black Friday presents a window of opportunity for cyber criminals

Consumers can expect email-based attacks using seasonally themed lures for major shopping events such as Black Friday.
Andy Barratt

Attention! Why ex-services personnel should be at the front line of cybersecurity

Andy Barratt, UK managing director at cybersecurity consultancy Coalfire, looks at the potential for ex-servicemen and women to bridge the skills gap
aa_EMEA_DAS_PR

Could you do more with your phone? When it comes to access control, you certainly can

In business and at home, the smartphone is a remote control for our lives. It’s a calendar and a credit card. We book holidays and do our daily banking
Scroll to Top