EOL IT Services has now merged with tier1 Asset Management Ltd

News & Views.

MIFID II Compliance Checklist

MiFID II, or the second Marketing in Financial Instruments Directive, came into place 3rd January 2018 and affects any business that performs investment services and activities. The regulation seeks to: increase the transparency of markets; move towards more...

read more
The 5 Principles of Data Governance

The 5 Principles of Data Governance

Data is one of the most valuable assets available to your business and how effectively you manage the quality, stewardship and accountability of that asset will determine, to a large extent, the overall success of your business. The successful governance of your data...

read more

5 Fatal Data Security Mistakes to Avoid

With the impending implementation of the GDPR (https://www.tier1.com/environment-and-csr/eu-gdpr/) any potential data security mistake could have far-reaching consequences for your business.  In our latest article on the subject of data security, we take a look at 5...

read more

5 Growing threats to Data Security

Threats to data security is increasingly being recognised as a priority by UK business leaders. This growing awareness is in response to increased incidences of cyber security attacks and data security breaches in 2016, as well as high profile, devastating cyber...

read more

Recent Stories

7 Questions to Ask Your ITAD Supplier.

7 Questions to Ask Your ITAD Supplier.

The growth of the cloud, the emergence of hybrid working and remote collaboration along with the soaring quantities of data-rich Internet of Things devices means that IT asset disposition no longer solely concerns the disposal of end of life IT assets. Today’s ITAD...

Are Unintentional Cyber-attackers Risking your Data Security?

Are Unintentional Cyber-attackers Risking your Data Security?

As we learnt during the last couple of years, for the cyber-criminals, a crisis merely presents an opportunity. In 2020, malware attacks rose by 358% and in the first quarter of 2022, Russia experienced nearly 3.6 million data breaches, an 11% increase*. Cyber-attacks...

More than four letters – What Does a Modern ITAD Service Look Like?

More than four letters – What Does a Modern ITAD Service Look Like?

The majority of businesses are aware of the importance of IT asset disposal when it comes to protecting company data and remaining compliant with the GDPR data destruction requirements.    Secure data erasure has never been more essential in today’s digitalised...

Categories

Get in touch and see
how we can help.

Either fill in the form below or give us a call to speak to one of our friendly team.

    How to Choose an ITAD Partner

    Data security should be your number one priority when selecting an ITAD partner. After all, that’s the main reason you need their help. However, that isn’t to say it’s the only factor you should consider. There are plenty of other factors that set ITAD suppliers...

    What is ITAD?

    When the time comes to upgrade your business's IT assets there are many questions to be taken into consideration. For example, what happens to the outgoing IT equipment, and who will be responsible for ensuring all sensitive data is securely destroyed? In the...

    Are Your IT Assets Safe for Resale?

    Every IT asset you have will reach its end of life eventually, but that doesn’t mean every item needs to be disposed of or destroyed. Reselling your redundant IT assets is a great way to offset some of the cost of purchasing new equipment- according to the UN...

    The EMAC (External Moves and Changes) Checklist

    Relocating to a new office space can be hugely beneficial to your business. Whether you’re relocating because you need more space for a growing team, a more creative workspace, or because you want your very own space, moving offices is an exciting step in your...

    The GDPR: One Year On

    The GDPR (General Data Protection Regulation) came into play on 25th May 2018, replacing the former DPA (Data Protection Act) to enhance the data privacy of citizens in the European Union. The Regulation applies to all EU companies, and those that provide good and...

    Data Centre Decommissioning Checklist

    There’s no denying how useful checklists can be. No matter the task in question, it’s always useful to have a black and white list of everything you need to have checked and completed to make a process run smoothly. It’s certainly no different when it comes to...

    Recent Stories

    7 Questions to Ask Your ITAD Supplier.

    7 Questions to Ask Your ITAD Supplier.

    The growth of the cloud, the emergence of hybrid working and remote collaboration along with the soaring quantities of data-rich Internet of Things devices means that IT asset disposition no longer solely concerns the disposal of end of life IT assets. Today’s ITAD...

    Are Unintentional Cyber-attackers Risking your Data Security?

    Are Unintentional Cyber-attackers Risking your Data Security?

    As we learnt during the last couple of years, for the cyber-criminals, a crisis merely presents an opportunity. In 2020, malware attacks rose by 358% and in the first quarter of 2022, Russia experienced nearly 3.6 million data breaches, an 11% increase*. Cyber-attacks...

    More than four letters – What Does a Modern ITAD Service Look Like?

    More than four letters – What Does a Modern ITAD Service Look Like?

    The majority of businesses are aware of the importance of IT asset disposal when it comes to protecting company data and remaining compliant with the GDPR data destruction requirements.    Secure data erasure has never been more essential in today’s digitalised...

    Categories

    Get in touch and see
    how we can help.

    Either fill in the form below or give us a call to speak to one of our friendly team.

      Recent Stories

      7 Questions to Ask Your ITAD Supplier.

      7 Questions to Ask Your ITAD Supplier.

      The growth of the cloud, the emergence of hybrid working and remote collaboration along with the soaring quantities of data-rich Internet of Things devices means that IT asset disposition no longer solely concerns the disposal of end of life IT assets. Today’s ITAD...

      Are Unintentional Cyber-attackers Risking your Data Security?

      Are Unintentional Cyber-attackers Risking your Data Security?

      As we learnt during the last couple of years, for the cyber-criminals, a crisis merely presents an opportunity. In 2020, malware attacks rose by 358% and in the first quarter of 2022, Russia experienced nearly 3.6 million data breaches, an 11% increase*. Cyber-attacks...

      More than four letters – What Does a Modern ITAD Service Look Like?

      More than four letters – What Does a Modern ITAD Service Look Like?

      The majority of businesses are aware of the importance of IT asset disposal when it comes to protecting company data and remaining compliant with the GDPR data destruction requirements.    Secure data erasure has never been more essential in today’s digitalised...

      Categories

      Get in touch and see
      how we can help.

      Either fill in the form below or give us a call to speak to one of our friendly team.