Premium Only Content
Old Hardware Can Expose Sensitive Business Information
Wondering what happens to your old devices when they’re recycled, upgraded, or passed down? In this video, Chris and Sarah Howells from Learn Online Security explain how laptops, phones, printers, gaming systems, and even smart home devices can hold sensitive information—and why scammers target them.
Learn practical tips for wiping, factory resetting, and safely disposing of your devices to protect your personal and business data.
Key topics we cover:
📌 Wipe or destroy end-of-life devices
📌 Business and home devices hold sensitive data
📌 Factory reset, remove memory, or physically destroy
📌 Children’s and seniors’ devices need extra care
📌 Include how you'd like your devices handled in your will
What are my next steps?
📖 Start learning for free at https://learnonlinesecurity.com/start-here
🏫 Join the free Skool community at https://www.skool.com/learn-online-security-4898
🔐 Become a superhero and support the channel https://learnonlinesecurity.com/heroes/superheroes
🏢 Learn more about our social engineering training for employees & business certification courses https://learnonlinesecurity.com/business-training
Follow Learn Online Security:
Skool: https://www.skool.com/learn-online-security-4898
Facebook: https://www.facebook.com/LearnOnlineSec
Instagram: https://www.instagram.com/learnonlinesecurity
Rumble: https://www.rumble.com/learnonlinesecurity
Website: https://www.learnonlinesecurity.com
⌚Time Stamps ⌚
00:00 End-of-Life Devices: Where Your Information Travels
0:43 How to Clean and Wipe Old Devices Safely
2:13 Business Devices That Store Sensitive Data
5:51 Home Devices for Kids and Seniors That Need Wiping
8:29 What Personal Information Gets Passed On Through Devices
9:06 Risks of Passing Along Old Devices Without Clearing Data
13:06 Setting Up Child Accounts: Avoid Age-Lying Risks
15:27 Gaming Systems and Cloud Storage: How Your Data Is Collected
15:53 How to Properly Dispose of and Recycle Electronic Devices
18:06 Seniors at Risk: Protecting Their Devices and Information
23:33 Digital Devices in Wills: Planning for End-of-Life Security
#DigitalSecurity, #LearnOnlineSecurity, #DeviceSafety
-
1:10
Learn Online Security
1 month agoThe Hidden Dangers of Passing Down Phones Without Wiping Them
71 -
VapinGamers
3 hours ago $7.96 earnedDestiny 2 - Dungeons and Loot with Friends - !rumbot !music
57.4K -
2:07:44
TimcastIRL
4 hours agoTrump's Secret Plan To Make Charlie Kirk VP, America Fest IN CIVIL WAR | Timcast IRL
188K136 -
LIVE
I_Came_With_Fire_Podcast
13 hours agoLive Fire: Christmas Special
348 watching -
46:26
Sarah Westall
6 hours agoWhat’s Behind the Silver Surge? Large Institutions Cashing In w/ Andy Schectman
19.1K -
6:42:10
Turning Point USA
12 hours agoLIVE NOW: AMFEST DAY 2 - VIVEK, JACK POSOBIEC, MEGYN KELLY, ALEX CLARK AND MORE…
1.2M180 -
1:14:37
Flyover Conservatives
23 hours agoHow to Win 2026 Before It Starts — Clay Clark’s Goal-Setting Blueprint | FOC Show
18K1 -
12:52
The Kevin Trudeau Show Limitless
2 days agoBeyond Good And Bad: The Hidden Reality Code
50.4K21 -
1:03:11
BonginoReport
7 hours agoBrown U Security Failures EXPOSED - Nightly Scroll w/ Hayley Caronia (Ep.201)
135K39 -
51:09
Patriots With Grit
3 hours agoWill A.I. Replace Doctors? | Dr. Stella Immanuel MD
13.4K3