Article suggestions: Difference between revisions
removed razer from the articles to write, will be adding to the "to improve" list |
Removed row about age verification. |
||
Line 117: | Line 117: | ||
|Factory reset and deconfiguration guides for removing personal/sensitive data from devices before change of ownership to avoid that data being used for identity theft, spear phishing and scams. | |Factory reset and deconfiguration guides for removing personal/sensitive data from devices before change of ownership to avoid that data being used for identity theft, spear phishing and scams. | ||
|<ref>{{cite web|title=ACCC Report Revelations Of Scams And Cyber Crime Not Surprising |website=Tech Business News |url=https://www.techbusinessnews.com.au/news/accc-report-revelations-of-scams-and-cyber-crime-not-surprising/ |publication-date=29 April 2024 |access-date=20 July 2025 |quote="Whilst there exists the Protective Security Policy Framework (PSPF) and the Information Security Manual (ISM) which direct government and critical industry to use NAID AAA certified recyclers to destroy and sanitise data at end of life, there remains confusion over ownership of accountability."}}</ref> | |<ref>{{cite web|title=ACCC Report Revelations Of Scams And Cyber Crime Not Surprising |website=Tech Business News |url=https://www.techbusinessnews.com.au/news/accc-report-revelations-of-scams-and-cyber-crime-not-surprising/ |publication-date=29 April 2024 |access-date=20 July 2025 |quote="Whilst there exists the Protective Security Policy Framework (PSPF) and the Information Security Manual (ISM) which direct government and critical industry to use NAID AAA certified recyclers to destroy and sanitise data at end of life, there remains confusion over ownership of accountability."}}</ref> | ||
|- | |- | ||
|[[Microsoft]] | |[[Microsoft]] |