EOL IT Services has now merged with tier1 Asset Management Ltd

News & Views.

How to Dispose of a Company Computer Securely

In today’s increasingly digital world, computers are indispensable to most companies. Not only do they allow employees to do their jobs, computers are also used to store sensitive data about the company, its employees and its clients. This means that when your company...

read more

The Dangers of Free IT Asset Disposal: Data Security

No one ever likes to spend money unnecessarily, and it is great when you find a free or low cost service that will do the job properly. However, IT disposal is not an area in which it pays to cut corners. The financial savings you may make are invalidated by the data...

read more

What is Wannacry?

On Friday 12th May 2017, a large cyber-attack using WannaCry ransomware, targeting Microsoft Windows operating systems, was launched. It has swiftly infected more than 230,000 computers in 150 countries (with the ransom payments being requested in bitcoin in more than...

read more

What should you look for in an ITAD?

The things to consider Whether you are relocating, refreshing your IT estate or heading to the cloud – you will undoubtedly generate redundant IT hardware and as a result will need to ensure any residing data on that equipment is adequately erased. When choosing to...

read more

Recent Stories

Are Unintentional Cyber-attackers Risking your Data Security?

Are Unintentional Cyber-attackers Risking your Data Security?

As we learnt during the last couple of years, for the cyber-criminals, a crisis merely presents an opportunity. In 2020, malware attacks rose by 358% and in the first quarter of 2022, Russia experienced nearly 3.6 million data breaches, an 11% increase*. Cyber-attacks...

More than four letters – What Does a Modern ITAD Service Look Like?

More than four letters – What Does a Modern ITAD Service Look Like?

The majority of businesses are aware of the importance of IT asset disposal when it comes to protecting company data and remaining compliant with the GDPR data destruction requirements.    Secure data erasure has never been more essential in today’s digitalised...

Is Our Healthcare Being Held to Ransom?

Is Our Healthcare Being Held to Ransom?

Like all sectors, our healthcare industry has become increasingly reliant on technology, the Internet of things and smart equipment that drives efficiency. However, healthcare institutions are unquestionably difficult to secure, trailing behind other industries when...

Categories

Get in touch and see
how we can help.

Either fill in the form below or give us a call to speak to one of our friendly team.

    Managing the IT Lifecycle

    Managing the IT Lifecycle All things must come to an end, and that is especially true with information technology. Technological change moves quickly in the business world, shortening the lifespan of our existing assets in the process. Technology which was once...

    Things to Consider When Decommissioning a Data Centre

    There are several different factors to consider when decommissioning a data centre, not just for a smooth operation and minimal risk, but also to ensure that you yield the maximum value from your IT assets. However, it’s not just your IT assets that you’ll need to...

    Maximising Value from Your ITAD Reverse Supply Chain

    Business technology is a wheel that never stops spinning. Each year the average speed of the computers available to buy increases, while data storage capabilities double on average. This results in a consistently high turnover of technology, as businesses strive to...

    Are Your Ageing IT Assets a Data Security Threat?

    There comes a point in the life of every business when the time comes to upgrade your IT infrastructure. The pace of technological change moves so quickly that IT assets which were once cutting edge soon become dated. Upgrading your IT infrastructure can add huge...

    Managing a Secure IT Asset Disposition Program

    You might presume that disposing of your redundant IT equipment is as simple as wiping sensitive data and removing it from your business premises, be that through resale or disposal. In reality, however, there is much more to managing a secure IT asset disposition...

    Recent Stories

    Are Unintentional Cyber-attackers Risking your Data Security?

    Are Unintentional Cyber-attackers Risking your Data Security?

    As we learnt during the last couple of years, for the cyber-criminals, a crisis merely presents an opportunity. In 2020, malware attacks rose by 358% and in the first quarter of 2022, Russia experienced nearly 3.6 million data breaches, an 11% increase*. Cyber-attacks...

    More than four letters – What Does a Modern ITAD Service Look Like?

    More than four letters – What Does a Modern ITAD Service Look Like?

    The majority of businesses are aware of the importance of IT asset disposal when it comes to protecting company data and remaining compliant with the GDPR data destruction requirements.    Secure data erasure has never been more essential in today’s digitalised...

    Is Our Healthcare Being Held to Ransom?

    Is Our Healthcare Being Held to Ransom?

    Like all sectors, our healthcare industry has become increasingly reliant on technology, the Internet of things and smart equipment that drives efficiency. However, healthcare institutions are unquestionably difficult to secure, trailing behind other industries when...

    Categories

    Get in touch and see
    how we can help.

    Either fill in the form below or give us a call to speak to one of our friendly team.

      Recent Stories

      Are Unintentional Cyber-attackers Risking your Data Security?

      Are Unintentional Cyber-attackers Risking your Data Security?

      As we learnt during the last couple of years, for the cyber-criminals, a crisis merely presents an opportunity. In 2020, malware attacks rose by 358% and in the first quarter of 2022, Russia experienced nearly 3.6 million data breaches, an 11% increase*. Cyber-attacks...

      More than four letters – What Does a Modern ITAD Service Look Like?

      More than four letters – What Does a Modern ITAD Service Look Like?

      The majority of businesses are aware of the importance of IT asset disposal when it comes to protecting company data and remaining compliant with the GDPR data destruction requirements.    Secure data erasure has never been more essential in today’s digitalised...

      Is Our Healthcare Being Held to Ransom?

      Is Our Healthcare Being Held to Ransom?

      Like all sectors, our healthcare industry has become increasingly reliant on technology, the Internet of things and smart equipment that drives efficiency. However, healthcare institutions are unquestionably difficult to secure, trailing behind other industries when...

      Categories

      Get in touch and see
      how we can help.

      Either fill in the form below or give us a call to speak to one of our friendly team.