Below is a recap of this week’s blog posts including cybersecurity threats to watch out for in the new year part one and two, details on the closing of the Ohio CRT case and what 3PL means in the ITAD space.
Technology is evolving, and hackers are becoming more difficult to detect. For this reason, it is crucial to be aware of emerging cybersecurity threats. Below is part one of 2023’s most dangerous cybersecurity threats. Smart devices as hacking targets. AI is on the rise, and so are cyberattacks. The use of artificial intelligence has become increasingly popular in smart devices, making them targets for hackers.
Below is part two of 2023’s most dangerous cybersecurity threats to keep an eye out for in the new year. Attacks on cloud security. The number of workers choosing to work remotely has increased, which means many company employees are migrating assets to the cloud. As a result, cloud security is more important than ever, and hackers are targeting users more frequently.
The years-long Closed Loop Refining and Recovery legal dispute is nearing the end, at least for one state. When Closed Loop went under in 2016, the company left behind hundreds of millions of pounds of CRT material in warehouses. Warehouse owners Garrison Southfield Park and Olymbec USA then used dozens of CRT material suppliers, OEMs, and MRFs, claiming they were legally responsible for helping pay for the cleanup. As a result, defendants in 39 legal settlements have agreed to pay over $16 million to help fund the cleanup.
Companies are taking a more mindful approach to how their end-of-life IT assets are handled and processed. As companies become more knowledgeable about the value concept offered by ITAD service providers, they seek vendors who practice the same principles. In addition, due to companies’ demands to prioritize sustainable ITAD solutions, ITAD is changing to include value-added services such as ERP integration, portal customization for asset tracking, asset redeployment, re-imaging, and ESG reporting.