The end-user devices such as laptops, tablets and phones that were rapidly issued to facilitate working from home must now be returned to many companies. In reality, this does not always happen. The devices eventually end up in a cupboard somewhere or in one of the children's hands. This results in possible company data breaches and related risks.
Data destruction company Blancco commissioned research earlier this year on rash purchases to deal with the first waves of consequences of working from home. "This showed that a lot more hardware ended up in totally new places," explains Jan-Dirk Krispijn of IT company NEG-ITSolutions. The danger is at the end of the lifecycle, he believes. "There has been a lot of focus on acquiring new devices and keeping employees happy with them, but much less attention is paid to taking these devices in or disposing of them safely. The lack of oversight and control over these devices is a major concern of CIOs and IT managers.”
Devices are by no means always properly registered, creating immediate security risks. Company data from hardware that is returned after use, for example, can go haywire. "The lack of a well-coordinated issuance and intake process complicates insightful recording," Jan-Dirk said. Regaining control, he says, can be done through Device as a Service (DaaS) services. "Through these Device as a Service services, the entire process from procurement to disposal and everything in between is coordinated and made transparent. We keep a record of who uses each device. Upon return, we also record who returned the device, the data is permanently certified deleted, and we prepare the device for reuse or a second life, which in turn is better for the environment." Is certain data not removable? Then NEG-ITSolutions takes care of responsible destruction of the device. “For that, we are qualified,” he says.
NEG-ITSolutions processes 600,000 data carriers annually according to strict environmental and security requirements and guidelines. For security certifications such as ISO 27001 and NEN 7510, it undergoes a robust audit every year. Customers' security and privacy officers also regularly conduct audits to check their processes. "Rightly so," Jan-Dirk thinks. "As a company, if you put the control and management of the devices in our hands, you can and must be sure that everything is properly arranged in terms of security. That's part of our mature status in this DaaS domain.”
The experienced IT company from Nieuwegein does everything possible with its DaaS services to unburden its customers, including in terms of data security. "Soon we will move to new premises with the highest security class for companies," Jan-Dirk proudly explains. "This way we will ensure that not only the data and software, but also the hardware is maximally protected.”
Rapid response to peaks and troughs in Endemol's workplace requirements
"Managing stock, unpacking, labeling, preparing and quickly installing on demand, NEG-ITSolutions does it all. We don't get to see a box, don't have to worry about it."
Edwin de Bie
Infrastucture Manager
Endemol Nederland Mediagroep
NEG helps you decide whether the investment is worth it and whether better/more sustainable options are available. New or refurbished. It’s not just the price; the service, reachability and goodwill factor are also reasons for choosing NEG. They always score very well in all these areas.
So we can definitely recommend NEG, as we can ask them anything.
Michael Ruitenbeek
IT coordinator
Fortes Lyceum
We received the thin clients ready for use, with all the right settings, conveniently repackaged and coded. Even when circumstances meant Parnassia ordered late, the process was scaled up when necessary to speed things up and meet deadlines.
"I’ve been in the business for 20 years but never before have I come across such a level of flexibility.”
Lex de Groot
Technical Project Manager
Parnassia Groep