Page 99 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 99
A Guide to Mitigating the Cyber Risks
Posed by Refurbished Hardware
An insight into the cyber risks that are potentially posed when investing in refurbished
hardware, and an insight into how these potential risks can be prevented and/or tackled.
By Eloïse Tobler MSc, Ecommerce Supervisor, Wisetek
More businesses than ever before are rethinking their approach to hardware acquisition. As carbon
footprints become more of a concern, an increasing number of businesses are thinking twice about buying
new hardware directly from manufacturers. Hardware retention also remains a sore point, with as many
as 59% of companies thought to throw out equipment before it reaches the end of its operational life.
Making a saving on pre-owned hardware isn't just cost-effective, it's also far better for the environment.
However, refurbished hardware presents specific cyber risks that need to be considered. Read on as we
explore these in more detail, along with an outline of the steps you can take to mitigate them.
What Security Risks Need to Be Considered?
You may be able to make considerable savings by purchasing refurbished hardware, but there are
several major risks involved that leave you open to cyberattacks and data breaches.
Deleted Files
Traces of a file can remain on a device long after it has been deleted. Although the file itself may no
longer be present in its original location, traces of it will remain elsewhere in the system. If these files
contain harmful malware, you're at constant risk of cyberattacks. If these files were installed onto a device
intentionally, these risks can be unleashed the moment you start using refurbished hardware.
99