5 Mistakes Companies Make When Retiring IT Equipment (and How to Avoid Them)

May 22, 2025 at 7:14 pm by Amanda Canale

As technology evolves at a relentless pace, organizations are continually refreshing their IT infrastructure to stay competitive, secure, and efficient. But with the excitement of onboarding new systems comes a less glamorous yet equally critical task—retiring outdated IT equipment. This phase is often overlooked or rushed, leading to significant security, compliance, and environmental risks. Retiring IT assets isn’t just about unplugging and discarding them; it requires a thoughtful, documented, and secure process.

Here are five common mistakes companies make when retiring IT equipment, and how to avoid them.

Assuming Data Is Gone After Deletion

Perhaps the most pervasive and dangerous misconception is that data is permanently erased simply by deleting files or formatting hard drives. In reality, deletion simply removes the pointers to data, not the actual data itself. Without proper data sanitization protocols, sensitive corporate or customer information can still be recovered using forensic tools—even from devices that appear “clean.”

To prevent this, organizations must implement certified data destruction processes that meet or exceed standards such as NIST 800-88 or NSA, depending on the industry and classification of the data being destroyed. This can involve physical destruction, such as shredding, crushing, or disintegrating, and degaussing. However, if the drive contains classified information, it should be degaussed then physically destroyed, per the NSA. This two-way destruction method ensures complete and total obliteration.

Proper documentation should include both the data’s chain of custody and the destruction process. It’s also important to retain certificates of destruction for auditing purposes. Relying on basic deletion is a gamble no organization should take, especially with data privacy regulations tightening worldwide.

Shredded IT equipment inside an industrial shredder, illustrating improper disposal practices during IT asset retirement.

Overlooking Nontraditional Data Sources

When thinking about data-bearing equipment, organizations typically focus on obvious items like servers, desktops, or laptops. However, nontraditional data sources often fall through the cracks. Devices such as printers, copiers, VoIP phones, network switches, external hard drives, and even smart devices can store sensitive configuration data, credentials, or internal communications.

The root cause of this oversight is often a lack of a comprehensive IT asset inventory. Without knowing exactly what equipment exists and what data it might contain, companies risk leaving information behind during decommissioning. Creating and maintaining a detailed asset inventory—updated continuously throughout the hardware lifecycle—is essential. It allows for thorough tracking and ensures every device is accounted for, assessed for data sensitivity, and handled properly during retirement.

Not Verifying E-Waste Recyclers

Environmental responsibility is an increasingly important part of corporate social governance, and most businesses strive to dispose of retired IT assets through recycling partners. However, not all e-waste recyclers operate ethically or securely. Some may claim to responsibly dispose of electronics but instead export hazardous waste to developing countries or improperly dispose of data-bearing devices, creating significant brand and legal risks.

Due diligence is critical when selecting a recycling partner. Look for certifications such as R2 (Responsible Recycling) or e-Stewards, which ensure adherence to high environmental and data security standards. Auditing the recycler’s practices, requesting references, and visiting their facilities when possible can also help verify their legitimacy. Partnering with a reputable recycler protects both your company’s reputation and the planet.

Pile of discarded electronics and IT equipment in a warehouse, representing the risks of using uncertified e-waste recyclers for IT asset disposal.

Delaying Decommissioning

Outdated or unused IT assets often sit idle in storage closets, server rooms, or even employee homes for extended periods. This delay in decommissioning can create a host of problems. Unsecured, unused devices are prime targets for data breaches, theft, or accidental loss. Additionally, without a timely and consistent retirement process, organizations lose visibility into asset status, which can create confusion, non-compliance, or unnecessary costs (like continued software licensing or maintenance).

The best way to address this is by implementing in-house destruction solutions as an integrated part of the IT lifecycle. Rather than relying on external vendors or waiting until large volumes of devices pile up, organizations can equip themselves with high security data destruction machinery—such as hard drive shredders, degaussers, crushers, or disintegrators—designed to render data irretrievable on demand. This allows for immediate, on-site sanitization and physical destruction as soon as devices are decommissioned. Not only does this improve data control and reduce risk exposure, but it also simplifies chain-of-custody tracking by eliminating unnecessary handoffs. With in-house destruction capabilities, organizations can securely retire equipment at the pace their operations demand—no waiting, no outsourcing, and no compromise.

Failing to Establish a Chain of Custody and Involve Compliance Teams

Retiring IT equipment isn’t just a logistical or technical task—it’s also a matter of governance and accountability. Many organizations fail to establish a documented chain of custody when IT assets are moved, stored, or handed off to third-party vendors. This lack of visibility and traceability increases the risk of data loss, theft, or mishandling.

Furthermore, failure to involve compliance, legal, and security teams in the decommissioning process can lead to overlooked regulatory obligations or missteps. In industries governed by HIPAA, GDPR, PCI-DSS, or similar regulations, improper data disposal can result in hefty fines and reputational damage. In the government sector, improper disposal can result in far worse scenarios, such as the leak of classified national secrets.

To avoid this pitfall, organizations must formalize their decommissioning policies and workflows. This includes tagging each asset, tracking its movement through every stage of decommissioning, and involving all relevant stakeholders. A documented chain of custody ensures accountability and supports audits or investigations, should they arise. Including compliance and security teams in the planning stages helps identify applicable regulations and ensures proper adherence from start to finish.

Two data center employees reviewing a clipboard, illustrating the importance of chain of custody documentation and cross-team collaboration while retiring IT equipment.

Why In-House, High-Security Data Destruction Matters More Than Ever

All of the above mistakes share a common theme: a lack of control. The more hands data passes through, the higher the risk of exposure. That’s why in-house high-security data destruction is not only a best practice—it’s becoming a necessity.

By investing in high security data destruction solutions that are designed specifically for in-house data destruction, companies maintain full custody of their data from start to finish. Physical destruction solutions such as NSA/CSS-listed disintegrators, degaussers, and hard drive shredders allow businesses to render data unrecoverable before any asset leaves the premises. This eliminates the reliance on third-party vendors, reduces the risk of chain-of-custody failure, and reinforces compliance with the most stringent data protection regulations.

Moreover, in-house solutions offer operational flexibility and peace of mind. Assets can be destroyed immediately, in a controlled environment, by trained staff—ensuring sensitive data never leaves corporate oversight. For sectors like defense, healthcare, finance, and critical infrastructure, this level of control isn’t just helpful—it’s essential.

Organizations that take data destruction seriously are recognizing that outsourced convenience doesn’t always equal security. As threats to information security become more sophisticated, the safeguards must follow suit. Security Engineered Machinery’s (SEM) data destruction equipment is a proactive investment in compliance, reputation, and operational integrity.

In the end, how an organization disposes of its IT assets says just as much about its values as how it deploys them. When the goal is to protect data at every stage of its lifecycle, the most secure option is the one that never lets it out of your sight.

Top 5 SaaS Data Breaches

February 28, 2024 at 8:00 am by Amanda Canale

As of 2023, 45% of businesses have dealt with cloud-based data breaches, which has risen five percent from the previous year. Data breaches have increased with the advancement of cloud-based platforms and software as a service (SaaS). These services offer flexibility to access an absurd number of services on the internet rather than install ones individually. Although this is an incredible technological advancement, there are high-risk factors with data privacy that arise. Information can easily be shared between cloud services, meaning companies must protect their sensitive information at all costs. With the increase in the use of SaaS applications, there are security measures that should be taken to prevent data leaks from happening.

Here’s a rundown of well-known SaaS companies that have experienced significant data breaches and security measures to help prevent similar incidents from affecting you.

Facebook

Facebook has faced multiple data breaches over the last decade, with their most recent one in 2019, affecting over 530 million users. Facebook failed to notify these individual users of their data being stolen. Phone numbers, full names, locations, email addresses, and other user profile information were posted to a public database. Although financial information, health information, and passwords were not leaked, there is still a rise in security concerns from Facebook’s users.

Malicious actors used the contract importer to scrape data from people’s profiles. This feature was created to help users connect with people in their contact list but had security gaps which led actors to access information on public profiles. Security changes were put in place in 2019, but these actors had been able to access the information prior.

When adding personal information to profiles or online services, individuals need to be conscious of the level of detail they disclose as it can be personally identifying.

Microsoft

In 2021, 30,000 US companies and up to 60,000 worldwide companies total were affected by a cyberattack on Microsoft Exchange email servers. These hackers gained access to emails ranging from small businesses to local governments.

Again in 2023, a Chinese attack hit Microsoft’s cloud platform, affecting 25 organizations. These hackers forged authentication to access email accounts and personal information.

Constructive backup plans are crucial for a smooth recovery after a data breach occurs. Microsoft constantly updates its security measures, prioritizing email, file-sharing platforms, and SaaS apps. These cyberattacks are eye-opening for how escalated the situation can become. Designating a specific team for cybersecurity can help monitor any signs of suspicious activity.

Yahoo

Yahoo experienced one of the largest hacking incidents in history, affecting 3 billion user accounts. Yahoo did not realize the severity of this breach, causing the settlement to be $117.5 million. Yahoo offers services like Yahoo Mail, Yahoo Finance, Yahoo Fantasy Sports, and Flickr which were all affected by this breach.

This one-click data breach occurred when a Canadian hacker worked with Russian spies to hack Yahoo’s use of cookies and access important personal data. These hackers could obtain usernames, email addresses, phone numbers, birthdates, and user passwords, all of which are personally identifiable information (PII) and more than enough for a hacker to take over people’s lives. An extensive breach like Yahoo raises concern for its users regarding data privacy and the cybersecurity of their information.

Verizon

From September 2023 to December 2023, Verizon experienced a breach within its workplace. This breach occurred when an employee compromised personal data from 63,000 colleagues. Verizon described this issue as an “insider wrongdoing”. Names, addresses, and social security numbers were exposed but were not used or shared. Verizon resolved this breach by allowing affected employees to get two years of protection on their information and up to $1 million for stolen funds/ expenses.

While this information was not used or extended to customer information, companies need to educate their workplace on precautions for data privacy. If individuals hear that the inner circle is leaking personal information about their colleagues, it raises concern for customers.

 Equifax

Equifax, a credit reporting agency, experienced a data breach in 2017 that affected roughly 147 million consumers. Investigators emphasized the security failures that allowed hackers to get in and navigate through different servers. These hackers gained access to social security numbers, birth dates, home addresses, credit card information, and their driver’s license information.

This failed security check from an Equifax employee caused easy access for these hackers in multiple spots. Taking the extra time to ensure your company has secured loose ties is crucial for reducing attacks.

Conclusion

Data breaches occur no matter a company’s size or industry, but the risks can be reduced with secure and consistent precautions. Data breaches are common, especially with the extended use of cloud platforms and SaaS, but failing to store and transport information among services, to have a documented chain of custody, and data decommissioning process in place all play a role in having your sensitive information being accessed by the wrong kinds of people.

At SEM, we offer a variety of in-house solutions designed to destroy any personal information that is out there. Our IT Solutions, specifically our NSA-listed Degausser,  SEM Model- EMP1000- HS stands as the premier degausser in the market today. This degausser offers destruction with one click, destroying the binary magnetic field that stores your end-of-life data. SaaS companies can feel secure knowing their data is destroyed by an NSA-approved government data destruction model. While an NSA-listed destruction solution isn’t always necessary for SaaS companies, it is secure enough for the US Government, so we can assure you it’s secure enough to protect your end-of-life data, too.

Whether your data is government-level or commercial, it is important to ensure data security, which is where SEM wants to help. There is an option for everyone at SEM, with a variety of NSA-listed degaussers, IT crushers, and IT shredders to protect your end-of-life data. Further your security measures today by finding out which data solutions work best for you.

Data Centers: Every Square Foot Counts

November 15, 2023 at 1:30 pm by Amanda Canale

In the vast and complex world of data centers, the maximization of space is not just a matter of practicality; it is a crucial aspect that has the power to directly affect a facility’s efficiency, sustainability, flow of operations, and, frankly, financial standing.

Today, information isn’t just power, but rather it serves as the lifeblood for countless industries and systems, making data centers stand as the literal bodyguards of this priceless resource. With the ever-expanding volume of data being generated, stored, and processed, the effective use of space within these centers has become more critical than ever.

In layman’s terms, every square foot of a data center holds tremendous value and significance.

Now, we’re not here to focus on how you can maximize the physical space of your data center; we’re not experts in which types of high-density server racks will allow you more floor space or which HVAC unit will optimize airflow.

What we are going to focus on is our expertise in high-security data destruction, an aspect of data center infrastructure that holds an equal amount of value and significance. We’re also going to focus on the right questions you should be asking when selecting destruction solutions. After all, size and space requirements mixed with compliance regulations are aspects of a physical space that need to be addressed when choosing the right solution.

So, we are posing the question, “When every square foot counts, does an in-house destruction machine make sense?”

Let’s find out.

Data Center IT Specialist and System administrator Talk, Use Tablet Computer, Wearing Safety Wests. Server Clod Farm with Two Information Technology Engineers checking Cyber Security.

The Important Questions

Let’s start off with the basic questions you need to answer before purchasing any sort of in-house data destruction devices.

What are your specific destruction needs (volume, media type, compliance regulations, etc.) and at what frequency will you be performing destruction? 

The first step in determining if an in-house destruction solution is the right move for your facility is assessing your volume, the types of data that need to be destroyed, and whether you will be decommissioning on a regular basis. Are you only going to be destroying hard drives? Maybe just solid state media? What about both? Will destruction take place every day, every month, or once a quarter?

It’s important to also consider factors such as the sensitivity of the data and any industry-specific regulations that dictate the level of security required. Additionally, a high volume of data decommissioning might justify the investment in in-house equipment, while lower-volume needs might require a different kind of solution.

How much physical space can you allocate for in-house equipment?

By evaluating the available square footage in a data center, facility management can ensure that the space allocated for the data destruction equipment is not only sufficient for the machinery but will also allow for efficient workflow and compliance with safety regulations. The dimensions for all of our solutions can be found on our website within their respective product pages.

What is your budget for destruction solutions?

Determining budget constraints for acquiring and maintaining in-house data destruction equipment will allow you to consider not only the upfront costs but also ongoing expenses such as maintenance, training, and potential upgrades. It’s important to note that, in addition to evaluating your budget for ­in-house equipment, the comparison between an in-house solution and cost of a data breach should also be taken into consideration.

All of the answers to these questions will help determine the type of solution (shredder, crusher, disintegrator, etc.), the compliance regulation it should meet (HIPAA, NSA, NIST, etc.), the physical size, and if there should be any custom specifications that should be implemented. 

Warning icon on a digital LCD display with reflection. Concept of cyber attack, malware, ransomware, data breach, system hacking, virus, spyware, compromised information and urgent attention.

Data Breaches: A Recipe for Financial Catastrophes

One of the primary reasons why every square foot counts within data centers is the financial element. Building and maintaining data center infrastructures often come with significant expenses, ranging from real estate and construction to cooling, power supply, and hardware installations, just for starters. It’s important to ensure that you are maximizing both your physical space and your budget to get the most bang for your buck.

But even beyond the physical constraints and considerations, the financial implications can loom overhead, especially in the context of data security.

Data breaches represent not just a threat to digital security but also a financial consequence that can reverberate for years. The fallout from a breach extends far beyond immediate remediation costs, encompassing regulatory fines, legal fees, public relations efforts to salvage a damaged reputation, and the intangible loss of customer trust.

For example, from January to June 2019, there were more than 3,800 publicly disclosed data breaches that resulted in 4.1 billion records being compromised. And according to the IBM and Ponemon Institute report, the cost of an average data breach in 2023 is $4.45 million, a 15% increase over the past three years.

So, while, yes, you want to make sure you are making the best use out of your budget to bring in the necessary equipment and storage capability to truly use up every square foot of space, part of that budget consideration should also include secure in-house solutions. 

You’re probably saying to yourself, “As long as I can outsource my destruction obligations, I can maximize my physical space with said necessary equipment.”

You’re not wrong.

But you’re not necessarily right, either.

The Hidden Costs of Outsourced Data Destruction

Outsourcing data destruction has traditionally been a common practice, with the aim of offloading the burden of secure information disposal. However, as we’ve stated in previous blogs, introducing third party data sanitization vendors into your end-of-life decommissioning procedures can gravely increase the chain of custody, resulting in a far higher risk of data breaches.

Third-party service contracts, transportation costs, and potential delays in data destruction contribute to an ongoing financial outflow. More so, the lack of immediate control raises concerns about the security of sensitive information during transit. For example, in July 2020, the financial institution Morgan Stanley came under fire for an alleged data breach of their clients’ financial information after an IT asset disposition (ITAD) vendor misplaced various pieces of computer equipment that had been storing customers’ sensitive personally identifiable information (PII).

While ITADs certainly have their role within the data decommissioning world, as facilities accumulate more data, and as the financial stakes continue to rise, the need to control the complete chain of custody (including in-house decommissioning) becomes more and more crucial. 

In-House Data Destruction: A Strategic Financial Investment 

Now that your questions have been answered and your research has been conducted, it’s time to (officially) enter the realm of in-house data destruction solutions – an investment that not only addresses security concerns but aligns with the imperative to make every square foot count. 

It’s crucial that we reiterate that while the upfront costs associated with implementing an in-house destruction machine may appear significant, they must be viewed through the lens of long-term cost efficiency and risk mitigation. 

In the battle against data breaches, time is truly of the essence. In-house data destruction solutions provide immediate control over the process, reducing the risk of security breaches during transportation and ensuring a swift response to data disposal needs. This agility becomes an invaluable asset in an era where the threat landscape is continually evolving. In-house data destruction emerges not only as a means of maximizing space but as a financial imperative, offering a proactive stance against the potentially catastrophic financial repercussions of data breaches. 

Whether your journey leads you to a Model 0101 Automatic Hard Drive Crusher or a DC-S1-3 HDD/SSD Combo Shredder, comparing the costs of these solutions (and their average lifespan) to a potential data breach resulting in millions of dollars, makes your answer that much simpler: by purchasing in-house end-of-life data destruction equipment, your facility is making the most cost-effective, safest, and securest decision.

You can hear more from Ben Figueroa, SEM Global Commercial Sales Director, below.