Premium Only Content
Old Hardware Can Expose Sensitive Business Information
Wondering what happens to your old devices when they’re recycled, upgraded, or passed down? In this video, Chris and Sarah Howells from Learn Online Security explain how laptops, phones, printers, gaming systems, and even smart home devices can hold sensitive information—and why scammers target them.
Learn practical tips for wiping, factory resetting, and safely disposing of your devices to protect your personal and business data.
Key topics we cover:
📌 Wipe or destroy end-of-life devices
📌 Business and home devices hold sensitive data
📌 Factory reset, remove memory, or physically destroy
📌 Children’s and seniors’ devices need extra care
📌 Include how you'd like your devices handled in your will
What are my next steps?
📖 Start learning for free at https://learnonlinesecurity.com/start-here
🏫 Join the free Skool community at https://www.skool.com/learn-online-security-4898
🔐 Become a superhero and support the channel https://learnonlinesecurity.com/heroes/superheroes
🏢 Learn more about our social engineering training for employees & business certification courses https://learnonlinesecurity.com/business-training
Follow Learn Online Security:
Skool: https://www.skool.com/learn-online-security-4898
Facebook: https://www.facebook.com/LearnOnlineSec
Instagram: https://www.instagram.com/learnonlinesecurity
Rumble: https://www.rumble.com/learnonlinesecurity
Website: https://www.learnonlinesecurity.com
⌚Time Stamps ⌚
00:00 End-of-Life Devices: Where Your Information Travels
0:43 How to Clean and Wipe Old Devices Safely
2:13 Business Devices That Store Sensitive Data
5:51 Home Devices for Kids and Seniors That Need Wiping
8:29 What Personal Information Gets Passed On Through Devices
9:06 Risks of Passing Along Old Devices Without Clearing Data
13:06 Setting Up Child Accounts: Avoid Age-Lying Risks
15:27 Gaming Systems and Cloud Storage: How Your Data Is Collected
15:53 How to Properly Dispose of and Recycle Electronic Devices
18:06 Seniors at Risk: Protecting Their Devices and Information
23:33 Digital Devices in Wills: Planning for End-of-Life Security
#DigitalSecurity, #LearnOnlineSecurity, #DeviceSafety
-
12:51
Learn Online Security
14 days agoStop Hackers from Exploiting Employee Locations!
81 -
2:06:16
TheSaltyCracker
5 hours agoMedia Justifies Attack on National Guard ReeEEStream 11-26-25
90.9K232 -
3:54:35
Mally_Mouse
8 hours ago🎮 Let's Play!!: Stardew Valley pt. 34
36.7K2 -
18:25
MetatronHistory
2 days agoThe REAL Origins of the Macedonians
29.9K3 -
1:22:12
MattMorseTV
5 hours ago $143.06 earned🔴It’s MUCH WORSE than WE THOUGHT. 🔴
129K177 -
7:22:09
Meisters of Madness
8 hours agoOmega Gaiden - Part 4
16.6K1 -
2:51:18
Barry Cunningham
7 hours agoBREAKING NEWS: NATIONAL GUARD ATTACK PRESS CONFERENCE AND LIVE UPDATES!
76.3K48 -
LIVE
SilverFox
4 hours ago🔴LIVE - ARC AT NIGHT! COME THRU!
311 watching -
2:46:09
Joker Effect
4 hours agoCLAVICULAR - What the hell is "Looks Maxing"? Asmond Gold is a Demon. KaceyTron. Steve Will do it.
32.7K3 -
3:31:22
SlingerGames
3 hours agoLIVE - Wumble Wednesday - BIRTHDAY STREAM!
12.6K1