Before you get rid of the old device, make sure you:
- back up the files
- do a
Reverting your device back to how it was set up when you bought it.
- check the data has been removed.
Unfortunately you are viewing this website on an outdated browser which does not support the necessary features for us to provide an adequate experience.
Please switch to a modern browser such as latest version of Google Chrome, Mozilla Firefox, Apple Safari or Microsoft Edge.
Older devices quickly become unsupported, making them a security risk. Learn how to manage the risk, and when to replace them.
Technology is constantly improving and manufacturers are producing new models with better in-built security features. Providing special fixes for older models without these features becomes time consuming and expensive for manufacturers to support.
Instead, manufacturers pick a length of time that they will support them. This is like a best-before date for your phone or tablet. After that date, they are known as end-of-life devices and any new security issues will not be fixed – leaving you at higher risk of cyber attack.
Older devices do not have the constantly improving in-built security features of newer devices.
The companies that make devices only provide support for them for a fixed amount of time. For example iPad 1 and 2 are no longer supported by Apple and Windows XP is no longer supported by Microsoft.
When a device is no longer supported, it's known as an end-of-life device and any new security issues will not be fixed. This leaves the device at a higher risk of cyber attacks. A virus on an unsupported device can infect other devices on your home or business network and cause even more problems.
Know how long your tablet or phone will be supported for and always plan to replace it before it reaches end-of-life. Start planning to replace your end-of-life devices as soon as possible.
If you’re buying second-hand, or handing down a device to a family member, find out how much longer the device will be supported for.
Don’t store data you care about on it, in case the device is corrupted and the data is lost. Ensure that any data stored on the device is also backed-up on a separate hard-drive or online. This includes important documents, photos and emails.
Delete any apps you aren’t using any more or don’t need. Keep the ones you do need current with regular updates from the official app stores.
If you can’t replace the device, lower your security risk by practicing safe use:
A technology mainly used to connect devices with other devices, like headphones or keyboards, without using cables.
A wireless network, usually for connecting devices to the internet in a home or business. Short for 'wireless fidelity'.
connecting two devices so that one device can use the internet connection of the other.
Before you get rid of the old device, make sure you:
Reverting your device back to how it was set up when you bought it.
If you’ve experienced an online security issue, your first step is to contact the service provider.
You can also report an online issue or security incident to us at CERT NZ.