EOL IT Services has now merged with tier1 Asset Management Ltd
News & Views.
Security Limitations of the Solid State Drive
The expansion and innovation of storage mediums has been a priority since the start of personal computing. While some of the traditional hard drives, HDDs, have remained much the same for over 50 years, faster and more efficient storage technologies, such as SSDs,...
How to Dispose of a Company Computer Securely
In today’s increasingly digital world, computers are indispensable to most companies. Not only do they allow employees to do their jobs, computers are also used to store sensitive data about the company, its employees and its clients. This means that when your company...
How to Erase Mobile Data Securely – The Limitations of Factory Reset
Whether or not we like it, we are becoming more and more reliant on mobile devices - an average person will check theirs 46 times per day. Not only are they practically indispensable in our personal lives, many of us couldn’t realistically do our job without them....
GDPR: Why does it matter and how to get it right
When the European Union’s General Data Protection Regulation (GDPR) comes into force in May 2018 it will transform the way that any organisation has to look after personal data. Increasingly however, we are finding organisations are “GDPR-ed” out – exhausted and...
The Dangers of Free IT Asset Disposal: Data Security
No one ever likes to spend money unnecessarily, and it is great when you find a free or low cost service that will do the job properly. However, IT disposal is not an area in which it pays to cut corners. The financial savings you may make are invalidated by the data...
What is Wannacry?
On Friday 12th May 2017, a large cyber-attack using WannaCry ransomware, targeting Microsoft Windows operating systems, was launched. It has swiftly infected more than 230,000 computers in 150 countries (with the ransom payments being requested in bitcoin in more than...
What should you look for in an ITAD?
The things to consider Whether you are relocating, refreshing your IT estate or heading to the cloud – you will undoubtedly generate redundant IT hardware and as a result will need to ensure any residing data on that equipment is adequately erased. When choosing to...
UK Security Breaches On The Rise – Are You Taking Action?
Unfortunately data security breaches are becoming more and more common which means that UK businesses are being forced to reevaluate their cyber security practises and data leak protection schemes. The issue of UK data security breaches is especially apparent given...
How Much of Your Business Data is Google Tracking?
If you are like most business people, you probably utilise Google on a daily basis, using it to solve a variety of issues and answer queries. However, you may have never considered the types of data (and the amounts) that Google stores each time that you use it. While...
Could The End of The Safe Harbour Agreement Impact Your Business Data?
The European Court of Justice has just ruled the Safe Harbour Agreement between the European and the United States invalid after Austrian law student, Max Schrems, brought it to their attention. Schrems alerted the authorities following Edward Snowden’s revelations...
Recent Stories
Categories
Get in touch and see
how we can help.
Either fill in the form below or give us a call to speak to one of our friendly team.
Things to Consider When Decommissioning a Data Centre
There are several different factors to consider when decommissioning a data centre, not just for a smooth operation and minimal risk, but also to ensure that you yield the maximum value from your IT assets. However, it’s not just your IT assets that you’ll need to...
Maximising Value from Your ITAD Reverse Supply Chain
Business technology is a wheel that never stops spinning. Each year the average speed of the computers available to buy increases, while data storage capabilities double on average. This results in a consistently high turnover of technology, as businesses strive to...
Chain of Custody: Do you know where your IT Assets are?
Since the GDPR came into play in 2018, businesses are highly aware of the importance of dealing with data appropriately to safeguard both business information and that of employees and clients. Secure passwords, 2-factor authentication (2FA) and anti-phishing training...
Are Your Ageing IT Assets a Data Security Threat?
There comes a point in the life of every business when the time comes to upgrade your IT infrastructure. The pace of technological change moves so quickly that IT assets which were once cutting edge soon become dated. Upgrading your IT infrastructure can add huge...
Managing a Secure IT Asset Disposition Program
You might presume that disposing of your redundant IT equipment is as simple as wiping sensitive data and removing it from your business premises, be that through resale or disposal. In reality, however, there is much more to managing a secure IT asset disposition...
4 Reasons You Should Outsource ITAD
It’s important for every business to have a plan for their IT Asset Disposition process. While many businesses believe they can deal with ITAD in-house, there are a number of different reasons for outsourcing these services. Despite common misconceptions that keeping...
Recent Stories
Categories
Get in touch and see
how we can help.
Either fill in the form below or give us a call to speak to one of our friendly team.
Things to Consider When Decommissioning a Data Centre
There are several different factors to consider when decommissioning...
Maximising Value from Your ITAD Reverse Supply Chain
Business technology is a wheel that never stops spinning. Each year...
Chain of Custody: Do you know where your IT Assets are?
Since the GDPR came into play in 2018, businesses are highly aware...
Are Your Ageing IT Assets a Data Security Threat?
There comes a point in the life of every business when the time...
Managing a Secure IT Asset Disposition Program
You might presume that disposing of your redundant IT equipment is...
4 Reasons You Should Outsource ITAD
It’s important for every business to have a plan for their IT Asset...
Recent Stories
Categories
Get in touch and see
how we can help.
Either fill in the form below or give us a call to speak to one of our friendly team.


