Premium Only Content
Old Hardware Can Expose Sensitive Business Information
Wondering what happens to your old devices when they’re recycled, upgraded, or passed down? In this video, Chris and Sarah Howells from Learn Online Security explain how laptops, phones, printers, gaming systems, and even smart home devices can hold sensitive information—and why scammers target them.
Learn practical tips for wiping, factory resetting, and safely disposing of your devices to protect your personal and business data.
Key topics we cover:
📌 Wipe or destroy end-of-life devices
📌 Business and home devices hold sensitive data
📌 Factory reset, remove memory, or physically destroy
📌 Children’s and seniors’ devices need extra care
📌 Include how you'd like your devices handled in your will
What are my next steps?
📖 Start learning for free at https://learnonlinesecurity.com/start-here
🏫 Join the free Skool community at https://www.skool.com/learn-online-security-4898
🔐 Become a superhero and support the channel https://learnonlinesecurity.com/heroes/superheroes
🏢 Learn more about our social engineering training for employees & business certification courses https://learnonlinesecurity.com/business-training
Follow Learn Online Security:
Skool: https://www.skool.com/learn-online-security-4898
Facebook: https://www.facebook.com/LearnOnlineSec
Instagram: https://www.instagram.com/learnonlinesecurity
Rumble: https://www.rumble.com/learnonlinesecurity
Website: https://www.learnonlinesecurity.com
⌚Time Stamps ⌚
00:00 End-of-Life Devices: Where Your Information Travels
0:43 How to Clean and Wipe Old Devices Safely
2:13 Business Devices That Store Sensitive Data
5:51 Home Devices for Kids and Seniors That Need Wiping
8:29 What Personal Information Gets Passed On Through Devices
9:06 Risks of Passing Along Old Devices Without Clearing Data
13:06 Setting Up Child Accounts: Avoid Age-Lying Risks
15:27 Gaming Systems and Cloud Storage: How Your Data Is Collected
15:53 How to Properly Dispose of and Recycle Electronic Devices
18:06 Seniors at Risk: Protecting Their Devices and Information
23:33 Digital Devices in Wills: Planning for End-of-Life Security
#DigitalSecurity, #LearnOnlineSecurity, #DeviceSafety
-
0:18
Learn Online Security
24 days agoImprove your Microsoft Teams skills at this workshop!
16 -
49:24
Donald Trump Jr.
3 hours agoPeter Navarro Went to Prison So You Won't Have to | TRIGGERED Ep,286
16.2K26 -
LIVE
Nerdrotic
11 hours agoNerdrotic at Night 528
586 watching -
1:16:12
Kim Iversen
3 hours agoTrump Might Actually Run For A THIRD Term?! | Turbo Cancers Are Rising—Media Pretends It’s Fine
50.1K34 -
1:09:38
TheCrucible
2 hours agoThe Extravaganza! EP: 60 with Special Guest: Vince Offer (10/27/25)
54.2K2 -
1:04:18
Candace Show Podcast
4 hours agoCharlie's Angels Or Demons? Disturbing Footage Emerges. | Candace Ep 252
58.7K181 -
LIVE
Quite Frankly
5 hours agoThe Forest King, NPC Nation, Calls & EXTRAS | Lubomir Arsov 10/27/25
196 watching -
LIVE
The Mike Schwartz Show
1 hour agoTHE MIKE SCHWARTZ SHOW Evening Edition 10-27-2025
135 watching -
13:53
Tundra Tactical
2 hours agoGlock Apocalypse - Tundy Meme Review
2.66K1 -
LIVE
Jamie Kennedy
15 hours agoThe Macabre Mind of Bill Moseley: Horror, Philosophy & the Spirit of Darkness| Ep 228 HTBITY
93 watching