EOL IT Services has now merged with tier1 Asset Management Ltd
News & Views.
Microsoft Office Users Should Be Aware of the Dridex Virus
Until now, you may never have heard of Dridex, a new strain of malware. That might be about to change – this year alone they have managed to steal over £20,000 from UK bank accounts. Microsoft Office users should be alert, prepared and know how to stay safe from...
Prepare Your Business for the New EU Data Protection Regulations.
The EU is preparing to release new data protection regulation reforms. Whilst the exact details have not yet been released (and it will be a number of years before the new laws are actually put into practise), it is never too early to begin preparing your business for...
Two Factor-Authentication: The Pros and Cons
It is critically important to protect sensitive data in business. However, in many organisations, not enough is being done to educate staff about how they can effectively protect their data beyond, creating a secure password. A myriad of other systems exist that can...
Using Big Data Applications Can Lead to Big Losses
It has never been more important that companies handle their Big Data applications effectively. A new report from Swiss cybersecurity firm BinaryEdge suggests that poorly configured applications using Big Data could be leaking more than one petabyte of sensitive data....
The Delete Key Is Not A Secure Way To Dispose of Business Data
For the majority of us, the delete key is simply a useful tool that means the data that we no longer need is out of our way. That said, most of us rarely take a moment to think about where those files go after we have hit the button. After all, if the data is not...
10 Tips for End of Life Data Security
It is vital that your company has a process in place to deal effectively with End of Life data security. This security is important, not only for your own business data, but also for any data you may hold about your clients. An effective security system is important...
End of Life for Windows 2003 Server – What Now for Businesses?
The constant evolution of technology and software is a given, and often happens at a rate that is difficult for most people to keep up with – staying on top of countless new developments can be exhausting! Unfortunately, the development of new software often means...
Are your Employees at Risk of Social Engineering?
In the past, most hackers have relied on technological vulnerabilities to access and manipulate data illegally, but they are now beginning to play on social vulnerabilities to do just the same. The name of this newly popular practise is ‘social engineering’ – this is...
It’s Not Just Your Data That Hackers Are After
When you think of what hackers want, you probably think that they are after your most important financial data. However, security researchers have found that hackers are able to gain access to other pieces of important data on devices that you would never imagine...
Small Businesses are Targets of Hacking Too!
When it comes to hacking, it is not just large scale or global businesses that are at risk - small businesses are equally likely to fall victim to this threat. This danger became very apparent following the Target department store breach in 2013, an event that...
Recent Stories
Categories
Get in touch and see
how we can help.
Either fill in the form below or give us a call to speak to one of our friendly team.
The Benefits of Secure IT Asset Disposal
Technology is like oxygen in the business world, no company can survive without it. Furthermore, with the average speed of computers doubling every year, updates to the technology we build our businesses upon are increasingly common. There is also the growing problem...
How to Prepare for a Successful Data Centre Migration
Upgrading, decommissioning or migrating a data centre is one of the most complex processes a business can undertake. This is not a decision to be taken lightly and entails months of detailed planning for key stakeholders. The pay off for a successful data centre...
How to Maximise Value in Your Redundant IT Assets.
It’s only natural that your business’ IT needs will change as your business develops and grows. Adapting to these needs can be costly, so it’s important that you get as much out of your equipment as possible. This doesn’t mean making do with outdated technology,...
The Benefits of the Reverse Supply Chain
The reverse supply chain is often underestimated as a key business component. Whereas decisions over routes, item manufacturing and providers are taken with extreme care, the importance of hardware upgrades, process perfection and end of life product management goes...
5 Steps to a Secure Office Relocation
Undertaking an office relocation can be one of the most challenging processes faced by a business. Whether you're moving to reach a different market, to cut costs, or because you've outgrown your existing space, an office relocation will present a number of unique...
4 Things to Consider When Undertaking Data Centre Decommissioning
Data centre decommissioning is one of the most important processes a business can undertake. There are various considerations to manage in this process, such as mitigating risk while maximising return on investment, complying with industry and government regulations,...
Recent Stories
Categories
Get in touch and see
how we can help.
Either fill in the form below or give us a call to speak to one of our friendly team.
The Benefits of Secure IT Asset Disposal
Technology is like oxygen in the business world, no company can...
How to Prepare for a Successful Data Centre Migration
Upgrading, decommissioning or migrating a data centre is one of the...
How to Maximise Value in Your Redundant IT Assets.
It’s only natural that your business’ IT needs will change as your...
The Benefits of the Reverse Supply Chain
The reverse supply chain is often underestimated as a key business...
5 Steps to a Secure Office Relocation
Undertaking an office relocation can be one of the most challenging...
4 Things to Consider When Undertaking Data Centre Decommissioning
Data centre decommissioning is one of the most important processes a...
Recent Stories
Categories
Get in touch and see
how we can help.
Either fill in the form below or give us a call to speak to one of our friendly team.


