October 22, 2025, Singapore – This Cybersecurity Awareness month, SK Tes, a leading provider of secure IT asset disposition (ITAD) and lifecycle services, is calling on organizations on take a closer look at one of the most overlooked cybersecurity threats: end-of-life IT equipment.
While companies invest heavily in firewalls, endpoint protection, and threat detection, many fail to recognize the hidden risks lurking in their retired hardware. From hard drives to mobile phones, switches and routers, outdated devices often retain sensitive data that can be exploited if not properly managed.
Managing retired IT equipment isn’t just a logistical task, it’s a cybersecurity imperative,” says Tom Hoof, Group IT Director, “There are many examples of routers resold with corporate credentials still intact, and storage drives containing medical records end up in second-hand markets. These are evidence of poor or missing processes and systemic risks.
A common misconception is that factory resetting a device is a device is sufficient. It’s not. SK Tes advocates for data erasure that meets recognized data destruction standards such as NIST 800-88 and the newer IEE 2883:2022, which require not just data destruction but also verification that data is irretrievable.
SK Tes warns that improper disposal of IT assets isn’t just a technical oversight, it’s a serious compliance risk. Mishandling retired devices can lead for breaches of major global data protection regulations including GDPR, HIPAA, PCI DSS, NIS2 and DORA. These frameworks mandate strict controls over how sensitive data is stored, accessed, and destroyed.
When hard drives, or other equipment containing confidential information are discarded without proper sanitization, companies risk leaking personal health data, financial records or proprietary business information. The consequences can include hefty fines, legal action, and irreparable damage to brand reputation and customer trust.
This Cybersecurity Awareness Month, SK Tes urges IT leaders, compliance officers and procurement teams to ask: “Do we know where our retired assets are, how they are being managed and what’s still on them?”. Mishandling this technology, from USB drives to laptops to servers, can lead to serious consequences.
To help organizations navigate this critical phase of the IT lifecycle SK Tes is offering a free 8-point Checklist for Secure IT Asset Disposition. This practical guide outlines essential steps to ensure data is properly wiped, verified and disposed of in line with industry standards standards. Visit www.sktes.com to download the checklist.
Secure ITAD Checklist for Cyber Security - SK Tes
Prevent cyber security threats, data breaches and regulatory issues.
Access the Secure ITAD Checklist to keep your IT asset disposition (ITAD) process secure and compliant.
Get in touch with us, contact us.
See how SK Tes can help you today
