Summary

  • SK TES’ core services include secure data removal and IT asset disposal, with all devices being labelled, tracked and inventoried to ensure secure wiping or destruction.
  • Data escape is the greatest risk during IT asset disposal, according to SK TES’ chief commercial officer, who stresses the need for secure wiping or destruction of devices.
  • Devices are transported to a SK TES facility, with the serial number assigned to an asset tag to facilitate tracking.
  • Some firms, known as hyperscalers, have gigantic data centres nearby and use SK TES’ ITAD services when upgrading their servers.
  • Laptops and desktops are wiped using an automated Blancco system, with workers able to access switches or routers to enable deeper programmed wiping if required.
  • SK TES’s operations are designed to maintain client confidentiality, with strict security protocols in place.

By Kevin Purdy

Original Article