SkipToMainContent

Norton UK Blog

« Back to Norton Blog

How to Let Go of Old Tech Securely and Responsibly

by Norton-Team

If your planning on treating yourself to a new piece of tech or expecting a little surprise present this season remember not only should you protect your new toy but also prepare your old one for its new home. There are many ways to dispose of old tech, whether it’s donating your old phone to charity or handing down a retired laptop so once you’re ready to shift your digital life to a new device , you’ll need to follow a few steps to ensure your old technology has been properly wiped and recycled.

What good is being security conscious if you leave the back door open to anyone to access your personal information on an old laptop, PC or Tablet?

Here are some easy steps to help you clean those old devices and enjoy a carefree digital life:


Back-up your Important Files

If you’ve had your device for some time, put some thought into what files, folders apps or software are important to you. Make a list and copy data to a usb stick or external hard drive to keep at the ready to make the transition smooth.

Wipe Data Securely

You can’t just throw away your old device in the bin. You can, but it’s not a good idea. Your smartphone, laptop and tablet has loads of personal information stored inside: information online criminals would love to get their hands on. Before you get rid of old tech, you’ve got to make sure it has been securely wiped. This is also true of any USB or external hard drives you don’t want anymore.

If it’s a laptop or computer, first, you’ll need to download an application to erase your mechanical hard drive. You can select specific files to erase or clear the entire hard drive; it’s up to you. Software like Eraser is best for select files, whereas DBAN is easy for wiping an entire drive.

If your wiping software asks you to identify the number of passes you would like it to run, three is a sufficient number.

Just follow the instructions on whichever software you prefer and wait for it to do its thing. This can sometimes take a while and you should plan accordingly. If the process is interrupted, it may not be completed so monitor the process
Remember, putting files in the recycle bin is not the same thing as wiping them from the hard drive. These ‘deleted’ files can still be recovered by a professional or stolen by an online criminal, should they gain access to this device


Recycle Old Devices

Once you have successfully wiped your data, the next step is to take your old machine somewhere it can be recycled.

Many stores have a great recycling programs —regardless of where you bought it or how old the machine is, the company will properly dispose of it for free. This also includes recycling for electronic items like VHS recorders, cords, cables, and radios.

But wait a second… Isn’t it the time of the year for giving? Why not consider doing something charitable and donate your old tech to a reputable organization that will more than happily recondition old computers and monitors in any condition, as well as computer accessories. It’s free, and think how you may be helping someone less fortunate than you.

Transferring Data

If you backed up your data successfully before you wiped your old hard drive, putting your files back onto a new computer will be a snap. Just plug in your USB or external hard drive and drag your old files onto your new computer.


Securing Data

Now that you’re all set up with a fancy new device, and all your old data has been replaced, the next step is to secure your new device and all the personal information inside it.

Some new computers come with a free trial of security software. These are typically only good for a short period of time, and they will likely need to be updated or renewed at some point. Look for home computer security products that will help keep your computer updated and prepared for cyber attacks. These include anti-malware, firewall protection, and additional family features for users with young children. Don’t leave your computer unprotected, especially after you went through all the trouble of remembering to upgrade your hardware!

For android and iOS smartphones and tablets consider using mobile security software such as Norton Mobile Security to secure your new device.

No matter if it’s an old piece of tech or that fancy new upgrade, remember that your digital device and your digital life is all connected so think smart and think security!

Going online with your new device? Find out about 9 online habits that expose you to spyware

This entry was posted on Thu Dec 29, 2016 filed under how to guides , online security and optimise your device

Stealing your identity can be easy. Good thing calling us is too.

Help with identity theft starts here. Trusted by millions of customers around the globe. Get Antivirus, Online Privacy, and in case of identity theft, Identity restoration support.


Get our award winning Norton protection

PC Mag:

A trademark of Ziff Davis, LLC. Used under license. Reprinted with permission. © 2022 Ziff Davis, LLC. All Rights Reserved

No one can prevent all cybercrime or identity theft.

The Norton brand is part of NortonLifeLock Inc.

Copyright © 2023 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.

WANT MORE?

Follow us for all the latest news, tips and updates.