800 797 5478

free quote

Liquid Technology Blog

Many big companies such as Google, Amazon, Morgan Stanley, and Jetblue have committed to reducing or even possibly eliminating their carbon footprint in the next decade. In the infographic below, we provide a visual snapshot of the timeline.


Recently, security researcher Josh Frantz explored the security of refurbished devices. He started by purchasing devices from businesses that sold refurbished, donated, and used computers. The haul included desktops and cellphones. He discovered that none of the machines were encrypted or had passwords. Frantz was able to easily access the devices’ old data. On the devices, he found social security numbers, emails, credit cards, and passport information. Leaving data like this exposed could lead to identity theft or other malicious attacks. In addition, this could cost companies hefty fines and […]


Enterprise Becomes Sustainable Sustainability has become a growing trend for enterprises. In the next decade, several companies have pledged to contribute to the circular economy. A circular economy is a systemic approach to economic development designed to eliminate waste and pollution, keeping products and materials in use, and regenerating natural systems. This summer, Apple pledged to be carbon neutral by 2030. Ecommerce giant Amazon committed to being carbon neutral by 2040. In the next decade, Microsoft is working to become carbon negative. Carbon negative is the reduction of an entity’s carbon footprint to […]


Recently, Morgan Stanley discovered they possibly exposed customers’ data. Reportedly, the incident stems from the closure of two data centers in 2016. Morgan Stanley hired a recycler to remove data off servers and hardware.


A data breach can be costly and can impact an organization’s reputation. According to a report by Kaspersky Labs, human error caused approximately 90% of data breaches. The large amount of employees working from home exposes organizations to new security risks. Companies and employees should adhere to the following security protocol to safeguard their work devices. Secure Your Wi-Fi Network When you use a public Wi-Fi, your device is discoverable to anyone utilizing that network as well. This means they can gain access to your files, distribute malware, and more. […]