{"id":48742,"date":"2022-10-05T09:00:00","date_gmt":"2022-10-05T09:00:00","guid":{"rendered":"https:\/\/www.csoonline.com\/article\/3675290\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong.html#tk.rss_security"},"modified":"2022-10-05T09:00:00","modified_gmt":"2022-10-05T09:00:00","slug":"the-astronomical-costs-of-an-asset-disposal-program-gone-wrong","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/","title":{"rendered":"The astronomical costs of an asset disposal program gone wrong"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/07\/broken_computer_waste_garbage_by_dokumol_cc0_via_pixabay-100729755-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>Every entity should have an information technology asset disposal (ITAD) program as part of its information security process and procedure. Indeed, every time an IT asset is purchased, the eventual disposal of that asset should already be defined within an ITAD. When one doesn\u2019t exist, data becomes exposed, compromises occur, and in many cases, fines are levied. Such was the case with Morgan Stanley Smith Barney (MSSB), which continues to feel the repercussions of their ITAD\u2019s failure over the past several years, which has now resulted in $155 million USD in fines and penalties.<\/p>\n<p>On September 20, 2022, the Securities and Exchange Commission (SEC) reached <a href=\"https:\/\/www.sec.gov\/news\/press-release\/2022-168\" rel=\"nofollow noopener\" target=\"_blank\">a settlement agreement<\/a> in which MSSB paid a $35 million USD penalty for the improper disposal of devices containing MSSB customer persona identifying information (PII).<\/p>\n<p>In October 2020, a <a href=\"https:\/\/www.occ.gov\/static\/enforcement-actions\/ea2020-058.pdf\" rel=\"nofollow noopener\" target=\"_blank\">consent order was issued by the Office of the Comptroller of Currency<\/a> in which MSSB agreed to pay a penalty of $60 million. This was followed in January 2022 with the settlement of a <a href=\"https:\/\/d6jxgaftxvagq.cloudfront.net\/Uploads\/v\/s\/z\/morganstanleybreachsettlement12.31.21_754269.pdf\" rel=\"nofollow noopener\" target=\"_blank\">class-action lawsuit<\/a> in which MSSB agreed to pay an equal amount to victims of the ITAD failure and the resultant exposure of data.<\/p>\n<h2>Consequences of a deficient ITAD program<\/h2>\n<p>Within the <a href=\"https:\/\/www.sec.gov\/litigation\/admin\/2022\/34-95832.pdf\" rel=\"nofollow noopener\" target=\"_blank\">SEC\/MSSB settlement document<\/a>, it is clear that MSSB had an ITAD program in place, yet the program was deficient, inasmuch as it was \u201cnot reasonably designed\u201d and \u201cfailed to ensure that a qualified vendor was used for data decommissioning.\u201d In one of the documented instances, MSSB did the equivalent of ordering off the menu at a restaurant \u2013 they had a moving company, Triple Crown, whose skillset MSSB had identified in their own risk assessment dated 2013 as \u201clocal trucking, storage, and long-distance moving.\u201d<\/p>\n<p>In 2021 court filing, <a href=\"https:\/\/resource-recycling.com\/e-scrap\/wp-content\/uploads\/sites\/2\/2021\/08\/8-9-21-Memorandum-of-Law.pdf\" rel=\"nofollow noopener\" target=\"_blank\">MSSB passed the buck<\/a> and described a daisy chain of contractors and subcontractors who caused the data exposure. MSSB blamed Triple Crown for its failure to remove, wipe, and recycle the devices securely. Despite an agreement that Triple Crown was to have obtained MSSB\u2019s consent prior to engaging a subcontractor, the bank asserted that Triple Crown sold the devices to AnythingIT, telling MSSB that the devices had been destroyed. AnythingIT also failed to destroy the devices and continued the daisy chain of reselling them to KruseCom.&nbsp;<\/p>\n<h2>When asset disposal becomes asset deception<\/h2>\n<p>Discussing the MSSB ITAD failure, Kyle Marks, ITAD chain of custody expert and CEO of Retire-IT observed that \u201chow Morgan Stanley handled ITAD is not unusual. Getting caught is. ITAD has a problem with incentives. Everybody has an incentive to hide problems in IT asset disposition. ITAD is the last step in the very long journey of the IT asset lifecycle.\u201d<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>Marks emphasized the importance of a solid ITAD program as part of the procurement and life-journey of a device: \u201cInventory discrepancies begin the day new hardware is deployed. Discrepancies compound during each stage,\u201d he said.<\/p>\n<p>\u201cInstead of tracking assets and reporting losses when they happen, organizations wait until assets are retired. Too often IT asset management uses ITAD to sweep the problems under the rug. Electronic recyclers are willing accomplices \u2013 vendors are happy to get the old hardware. They have no incentive to speak up. Without adequate controls, ITAD is \u2018IT Asset Deception.\u2019&#8221;<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>The SEC\u2019s Gurbir S. Grewal, director of the SEC\u2019s Enforcement Division<a href=\"https:\/\/www.sec.gov\/news\/press-release\/2022-168\" rel=\"nofollow noopener\" target=\"_blank\">, commented in a public statement<\/a>: \u201cMSSB\u2019s failures in this case are astonishing. Customers entrust their personal information to financial professionals with the understanding and expectation that it will be protected, and MSSB fell woefully short in doing so. If not properly safeguarded, this sensitive information can end up in the wrong hands and have disastrous consequences for investors. Today\u2019s action sends a clear message to financial institutions that they must take seriously their obligation to safeguard such data.\u201d<\/p>\n<h2>The takeaway for CISOs<\/h2>\n<p>It is imperative that IT security leaders remember that an <a href=\"https:\/\/www.csoonline.com\/article\/3622257\/why-it-asset-disposal-is-still-a-security-risk.html\">ITAD program is data security 101<\/a>. It is also important to follow that program. It is a must-have, not a nice-to-have. This is where it is clear MSSB failed, lacking adequate checks and balances to verify that what they thought was going to happen in the disposal of IT equipment, happened as designed. As with most debacles, the cleanup costs more than competently instituting the program In MSSB\u2019s case they not only have had years of legal expenses, but they have also paid $155 million in fines.<\/p>\n<p>They could have benefited mightily from the Russian proverb: \u201cTrust, but verify.\u201d<\/p>\n<div class=\"end-note\"> <!-- blx4 #2004 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2004 blox4_html blxC51120\">\n<aside> <strong>Next read this<\/strong> <\/aside>\n<\/p><\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.csoonline.com\/article\/3675290\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As Morgan Stanley Smith Barney has learned, an information technology asset disposal program can protect a company against the potential catastrophe of data leaks from gear you\u2019re getting rid of. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":48743,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[10231,9256],"class_list":["post-48742","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-cso-and-ciso","tag-data-and-information-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The astronomical costs of an asset disposal program gone wrong 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The astronomical costs of an asset disposal program gone wrong 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-05T09:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/article\/2017\/07\/broken_computer_waste_garbage_by_dokumol_cc0_via_pixabay-100729755-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The astronomical costs of an asset disposal program gone wrong\",\"datePublished\":\"2022-10-05T09:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\\\/\"},\"wordCount\":749,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong.jpg\",\"keywords\":[\"CSO and CISO\",\"Data and Information Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\\\/\",\"name\":\"The astronomical costs of an asset disposal program gone wrong 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong.jpg\",\"datePublished\":\"2022-10-05T09:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong.jpg\",\"width\":150,\"height\":100},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CSO and CISO\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cso-and-ciso\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The astronomical costs of an asset disposal program gone wrong\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The astronomical costs of an asset disposal program gone wrong 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/","og_locale":"en_US","og_type":"article","og_title":"The astronomical costs of an asset disposal program gone wrong 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-10-05T09:00:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/article\/2017\/07\/broken_computer_waste_garbage_by_dokumol_cc0_via_pixabay-100729755-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The astronomical costs of an asset disposal program gone wrong","datePublished":"2022-10-05T09:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/"},"wordCount":749,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong.jpg","keywords":["CSO and CISO","Data and Information Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/","url":"https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/","name":"The astronomical costs of an asset disposal program gone wrong 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong.jpg","datePublished":"2022-10-05T09:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/10\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong.jpg","width":150,"height":100},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-astronomical-costs-of-an-asset-disposal-program-gone-wrong\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"CSO and CISO","item":"https:\/\/www.threatshub.org\/blog\/tag\/cso-and-ciso\/"},{"@type":"ListItem","position":3,"name":"The astronomical costs of an asset disposal program gone wrong"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48742"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48742\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/48743"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}