Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 4 Guidelines When Buying Used Computer Equipment

Tip of the Week: 4 Guidelines When Buying Used Computer Equipment

One way that your business can save money is by purchasing used computer equipment, but only if you do your research and perform a meticulous analysis of where it’s been, and why it’s no longer being used. If you’re serious about purchasing pre-owned computing equipment, consider these four tips.

The Hard Drive’s Age
One of the most critical components of a computer is the hard drive. It can be difficult to judge the condition of a hard drive by observation, so keep this general rule in mind; the average lifespan of a hard drive is about five years, so you don’t want to purchase one that’s four or more years old. Or, rather, you should prioritize finding those that have more life left in them, as an older hard drive is typically at a higher risk of crashing.

However, an older hard drive doesn’t necessarily have to be technically useless. This five-year rule only applies to hard drives that see continuous use. If you find one that’s been used sparingly during its lifetime, it will probably have more life left in it than you might initially think. In general, the five-year rule isn’t something that you need to hold to. Just like any technology solution, there will be hard drives that can outlast others; some are known to exceed even 10 years without experiencing issues. Solid state drives are capable of bypassing this rule altogether, as they’re built to last for much longer than the hard disk drive.

In the end, you want to make your decision based off of what you need your hard drive to do. If it’s something that absolutely cannot fail, you may be better off just purchasing a new one outright. Or, you could use a reliable data backup and disaster recovery solution, like a BDR, and hope for the best.

Also, be sure to give the computer a test before you actually purchase it (if possible). If it’s making strange noises, it’s not a safe investment for your business.

Clean Up Your Used Technology
As you’re well-aware, computers are known to collect all kinds of grime, germs, and dust. This is important to keep in mind when you purchase a new PC, seeing as it might not be the cleanest machine in the world. It’s your responsibility to clean it up and make sure that it, or any of its components, are ready for use. Of course, depending on how long this process takes, you may just come to the conclusion that it’s too much of a hassle.

Additionally, there are some other components of workstations that are way too germy to be passing around the office. One example is the keyboard, a device so filthy and foul that it collects more germs than toilet seats. Just let that sink in before you pass on a used keyboard to another user. You might come to the conclusion that it’s better to just buy a new one.

The Parts Might Be Damaged
Whether you want to believe it or not, there’s a reason why someone is selling their used technology. Either it doesn’t work, or they found something that works better. Basically, it comes down to functionality. There’s no point in shopping around and investing in used technology if you wind up getting something that doesn’t work as intended. You would have been better off just purchasing a new part altogether, but you may not realize this until it’s too late.

This is what’s known in the technology industry as risk management. Some sources, like reputable online dealers, will be more reliable to purchase used technology from. Others, however, may not be so trustworthy. We’re looking at you, Craigslist.

Consult the Professionals
Here’s one last tip for procuring quality computer equipment: contact the IT professionals at Total Tech Care. We’ll provide a clear risk assessment, identify quality sources of used IT equipment, and suggest new and affordable solutions that you may not even have known existed. It never hurts to ask for a second opinion.

If you’re finding that technology solutions are difficult to come by, reach out to us at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Business Management Users Phishing Upgrade Managed IT Services Windows Data Backup Outsourced IT Ransomware Windows 10 Office Cloud Computing Server Save Money Data Recovery Passwords Windows 10 Saving Money Holiday Gadgets Tech Term Social Media Chrome Virtualization Managed IT Services Managed Service Automation Microsoft Office Artificial Intelligence Facebook Operating System Cybercrime Computers Internet of Things BYOD Mobile Device Management Networking IT Support Wi-Fi Hacking Health Information Office 365 Alert Telephone Systems Remote Information Technology Managed Service Provider Covid-19 Spam BDR Bandwidth Social Engineering Mobility Employer-Employee Relationship Recovery Router Law Enforcement Application App History Password Money Big Data Data Breach Encryption Human Resources Applications Mobile Computing Remote Monitoring Private Cloud Office Tips Data Storage Managed IT Patch Management Training Apps VPN Remote Computing Blockchain Paperless Office Government Mobile Office How To Website Budget Infrastructure Voice over Internet Protocol Wireless Vulnerability Bring Your Own Device Data Management Work/Life Balance Windows 7 Word Gmail Settings Servers Two-factor Authentication Google Drive Flexibility Marketing Data Security Mouse WiFi HaaS IT solutions Avoiding Downtime Entertainment Meetings Connectivity Remote Work USB Save Time Risk Management Hacker Conferencing The Internet of Things Lithium-ion battery Scam Cleaning Data Protection End of Support Vendor Vendor Management Firewall Managed Services Physical Security Education Display Safety Virtual Reality HIPAA Apple Sports Redundancy Keyboard Employee/Employer Relationship Social RMM Telephone System Staff Software as a Service User Error Machine Learning Update Spam Blocking Electronic Medical Records Wearable Technology Retail Hard Drives Google Docs Document Management Instant Messaging Robot Excel Hiring/Firing Identity Theft Solid State Drive Wireless Technology Digital Signage Downtime IT Consultant How to Biometrics Virtual Desktop Data storage Humor Automobile Procurement Augmented Reality Fraud Workplace Strategy DDoS Net Neutrality Business Intelligence Computing Infrastructure SharePoint Remote Worker Help Desk Audit Worker Printing Going Green IT Management Cryptocurrency Customer Service Botnet Managed Services Provider IT Plan Environment Battery Comparison Shadow IT Fax Server Legal Database Unsupported Software CES Virus Remote Workers Internet Exlporer Charger SaaS Unified Threat Management Processor Business Technology Content Management Compliance Computer Accessories PDF Access Control OneNote Computer Care Hard Drive Network Congestion Virtual Assistant Current Events eWaste Telephony Proactive IT Authentication Samsung Best Practice Printer Computing YouTube Black Market Bluetooth Value Business Owner PCI DSS Virtual Machine Outlook Cost Management Leadership Digital Signature Troubleshooting 2FA Printer Server Fiber Optics Start Menu Warranty NarrowBand Employee Social Networking Cabling Screen Mirroring HVAC Loyalty Google Apps Search Messaging Books Policy iPhone Hypervisor Frequently Asked Questions Analysis Windows 10s Devices Dark mode Trend Micro Running Cable Mobile Administrator Default App Cast Enterprise Content Management Memory SMS Emergency Procedure Files Saving Time Tip of the week MSP webinar Accountants Public Cloud Thought Leadership Employer Employee Relationship Credit Cards dark theme Shopping Professional Services Microchip Chromecast Google Search IT Infrastructure Password Management Assessment Password Manager AI Multi-Factor Security FinTech Colocation Windows Server 2008 Uninterrupted Power Supply Bing Twitter Science Social Network Tools Search Engine Monitor Investment NIST Television Business Mangement Trending Employees Employee/Employer Relationships Smart Tech Consultant Customer Relationship Management Addiction Amazon Windows 365 Analytics Distributed Denial of Service ISP Reputation ROI Streaming Media Analyitcs Public Computer Recycling Video Conferencing Best Available Transportation Content Sales Bitcoin Regulations Wiring Tech Support Shortcuts Programming Practices Computer Fan Cache WIndows 7 Rootkit Amazon Web Services Point of Sale Techology Personal Laptop Cryptomining Customers Safe Mode Criminal Supply Chain Management Benefits Audiobook Monitoring Batteries Antivirus GDPR Workers Hosted Computing FENG Wireless Internet Windows 8 Online Shopping Windows 8.1 Digitize Touchpad Windows Server 2008 R2 IT service File Sharing IBM Smart Technology Specifications Politics Customer relationships Advertising Flash Camera Inventory Manufacturing Wire User Tablet Evernote Email Best Practices PowerPoint IT Assessment Windows Media Player Domains Software Tips Notifications Supercomputer Travel Millennials Computer Tips Managed IT Service Sync Printers Security Cameras Emails Biometric Security Maintenance Smart Office Managing Stress Wireless Charging Virtual CIO OneDrive IaaS Peripheral Relocation Bloatware Two Factor Authentication Workforce Digital Security Cameras Cameras Using Data Virtual Private Network Netflix 5G Root Cause Analysis Tablets Cables Video Games Copiers Worker Commute Quick Tip HBO Entrepreneur Knowledge Music Telecommuting Experience Ergonomics Skype Project Management Smartwatch Nanotechnology OLED Shortcut Data loss Cortana Scalability Development

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code