Categories PodcastThe T-Suite

T-Suite Podcast: Creative destruction — Proper IT asset liquidation


One of my favorite podcasts is Darknet Diaries by Jack Rhysider. He offers some real insight into the importance of securing your network. In a two-part episode, he starts its coverage talking to a tight-knit group of friends that enjoy hacking Xbox devices and ends the series with their tragic end. What was most interesting to me in that series was a group of kids were able to purchase Xbox dev kits (real, working Xbox machines with developer tools baked in) from a liquidator. Worse, Microsoft (presumably) dumped them there and seemingly never requested they be destroyed. These kids would purchase the discarded devices to not only try out an unreleased game box but also hack into Microsoft and pretty much every major game developer’s network to play unreleased games or even download source code.

The podcast taught me that even if you plan to liquidate your assets, it is critical organizations have a chain of custody for every device and ensure the proper destruction where it is needed.

In today’s T-Suite Podcast, I talk to Richard Greene, managing partner of Liquid Technology. We talk about how IT organizations should properly manage their liquidation projects and how to properly dispose of materials and destroy company data. We also talk about the industry best practices any liquidation facility should follow, along with some interesting stories along the way, including one dealing with the now-defunct Theranos.

You can reach Richard and his team at Liquid Technology.

Special thanks to Jennifer Handshew for introducing me to Richard.

Bill Raymond

Bill Raymond is a Microsoft MVP. As a contributor to TechGenix, he focuses on topics that directly affect IT, with a focus on cloud and hybrid cloud solutions.

Share
Published by
Bill Raymond

Recent Posts

Exchange errors: Common problems and commonsense fixes

Exchange errors are the curse of every IT admin’s job. Here are some common issues you may face — and…

1 hour ago

Losing your edge? 7 free tools to keep you focused at work

Staying focused at work in an always-connected world is hard! Here’s how to use tech — and some free tools…

18 hours ago

What’s next in the evolution of biometrics and facial recognition technology?

Facial recognition technology has matured to the point of being reliable — for better or for worse. What does the…

22 hours ago

Locking down your Exchange server with cipher suites

Cipher suites are a set of algorithms you need to secure your environment, either by using SSL and TLS. Here’s…

1 day ago

AI cyber risks: What to look out for when deploying AI technology

Artificial intelligence has greatly improved modern life. But businesses must recognize that AI cyber risks exist and take appropriate measures.

2 days ago

Review: Office 365 synchronizing and administration tool CiraSync

CiraSync offers an enterprise solution for syncing global address list contacts and calendars to smartphones and other mobile devices. Here’s…

2 days ago