A number of products are frequent targets of counterfeit schemes. Don’t let them take advantage of your business.
When you work in electronics authenticity testing, you realize there’s a lot of ingenuity out there, only all too often it’s used for insidious purposes. The black market for counterfeit electronics is big business. Trade in counterfeit and counterfeit goods now stands at 3.3% of global trade, according to OECD. And the electronics industry is the fourth hardest hit by counterfeit schemes, just after footwear, clothing, and leather goods.Read More
Increasingly sophisticated schemes require authenticity testing to keep fake parts out and protect your business reputation
Counterfeit parts are now so common the question is hardly if but when they will cross paths with your electronic products.
Ironically, one of our team members — an expert in authenticity testing — recently ran into a common scheme on a large online reseller platform. In this case, the buyer accused him of sending a counterfeit in an attempt to start an exchange process during which the buyer himself tried to send back a counterfeit product in return for one with authentic parts.Read More
The B Corporation Certification sets the gold standard for good business. Now, GER seeks to join the race to the top.
At Global Electronic Recycling, we call ourselves the “GER team” for a reason. The way we treat each other is, after all, a telling indication of the way we treat our customers. When our team members thrive, so will your business. Now, we seek to make official our effort to be a force for good.Read More
Data sanitization makes your data permanently unrecoverable, but don’t leave without verification
Sometimes being careful is still not enough. While organizations rightfully pour resources into preventing data breaches while their electronic equipment is in use, it is equally important to establish protocols for what happens after said equipment is no longer needed. These days, your organization likely has a legal and regulatory duty to dispose of sensitive customer or proprietary information in a manner that renders it fully irretrievable.Read More