ICEX - IT recycling and data destruction for business

January Newsletter

Happy New Year and welcome to the fourth edition of the ICEX newsletter. We aim to keep you up to date with what’s going on in the ITAD industry as well as what’s going on within ICEX. If there’s anything you’d like to see in the newsletter or something you want advice with then please contact us.

What’s in the news?
Many companies still don’t use an ADISA accredited company, however if your business wants to have confidence that their partners operate to the highest industry standards which reflect current best practice for handling data carrying assets, then look for their ADISA Certification to give you reassurance that they are the best service provider to use.

ICEX are one of 40 providers with the accreditation (2/1/2019), having passed a series of audits since being a member from 2011. The ADISA audit process includes full audits, unannounced operational audits and forensic audits. The rigorous approach ADISA takes ensures ITADs are kept on their toes and have tight processes in place to ensure the best possible service is offered to their clients

What’s new with ICEX?
As we enter 2019 the growth of ICEX is continuing. We are able to help more and more businesses with their IT Asset Disposal requirements, along with other life-cycle services we now offer to our clients.

We’re finding that more and more businesses are becoming aware of the requirement for an IT Asset Disposal Policy and to use a trusted partner to securely destroy or erase redundant data. As a long standing member of the ITAD governing body ADISA, we are able to offer the best possible service to our clients with complete transparency.

Security Tip Of The Month
Cyber war is upon us. Every newsletter, ICEX will share some security tips to help you keep your sensitive information secure. We would love to hear from you, what security issues are concerning you?

Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you, on a network that you trust. Whether it’s a friend’s phone, a public computer, or a cafe’s free WiFi—your data could be copied or stolen.