EOL IT Services has now merged with tier1 Asset Management Ltd
News & Views.
The Case for Data Security in an Ever Mobile World
We carry our mobile devices almost everywhere, making them the perfect place to store data we need to regularly access: website logins, banking passwords, client contact details, photos and videos. Sometimes it is not the devices themselves that are the attraction,...
Can Individuals Claim Compensation from Your Business after a Data Breach?
Unfortunately, there are more data breaches within businesses than desirable. Often, these data breaches will result simply with a lesson learned, rather than any legal action being taken. However, it is important to always be prepared for the possibility of customers...
Data Breach Trends on the Rise in Some Sectors (ICO Data Breach Audit 2015)
It would be expected that there are data breaches within some companies, and, in the past, certain sectors may have been more likely to suffer breaches than others. However, according to the figures published in the Information Commissioner’s Office Data Breach Audit...
How could the government’s Snoopers’ Charter affect your business?
The Draft Communications Data Bill, otherwise known as the Snoopers’ Charter has been proposed by the Conservative Party following the recent general election. The party claim that the bill will aim to "provide the police and intelligence agencies with the tools to...
What impact would leaving the EU have for the UK’s tech industry?
The question as to whether or not the UK should leave, or remain a part of, the European Union is hot topic at the moment. People usually talk about the impact that an EU exit would have on trading within the UK, and how the UK’s immigration policy would be affected....
Avoid Apple’s Messaging Glitch Crashing Your Devices
The recent messaging glitch that caused Apple products to crash was a hot topic in the news. Not only can this glitch effect iPhones, it also had the power to cause iPads and even Macs to crash if they received a malicious message. It is little more than a nuisance to...
Ransomware: A Modern Day Threat to your Company’s Data
We have all heard about malware that can infect and corrupt your system, putting customer data and sensitive information at risk. However, ransomware isn’t quite as widely talked about as other forms of malicious software. Ransomware is a type of malicious software...
Alternatives To The Potential Risks Of BYOD
BYOD, or Bring Your Own Device policies offer a plethora of opportunities and benefits to businesses at a surface level. Giving employees the ability to use just one device for work and personal use means that they remain contactable and able to do work wherever they...
Are Your Staff Prepared For Social Engineering Attempts To Access Company Data?
As cyber criminals become more and more aware that targeting middle managers using social engineering tactics actually works, they will do so more often. Attackers are moving away from large scale consumer attacks and opting for more sophisticated attacks that take...
Don’t Get Caught Out, Prepare For The EU Data Protection Law Changes Now
Any company that deals with data in the EU in any way will be aware of the imminent changes to the EU Data Protection Law. This will affect companies that have operations in the EU, store data of customers that live in the EU or deal with data that passes through the...
Recent Stories
Categories
Get in touch and see
how we can help.
Either fill in the form below or give us a call to speak to one of our friendly team.
Big Data and ITAD
'Big data' is a concept that refers to the large volumes of data at the disposal of modern business. In its typical usage, it is not necessarily the volume of data that makes big data such a valuable asset, but the way it is used. Big data can be mined for insights...
Electronic Asset Recovery: Uncovering the Value of Your IT Assets
Increasingly, there is a high turnover of IT assets across businesses large and small. With technology moving fast, businesses are quick to upgrade their hardware to avoid being left behind. This poses the problem as to what to do with the old hardware. Too often we...
Environmentally Friendly ITAD
We speak so often about the importance of data protection in IT asset disposal that the need to execute ITAD operations in an environmentally responsible manner often goes unmentioned. Of course, there are guidelines and directives in place, but that’s not to say...
Security Risks to be aware of Before Relocating Offices
Office relocation might be an inevitable aspect of business growth, but that doesn’t mean it’s without risk. Whether you’re moving to another city, or just to a larger office space in the same building, it’s important to carry out a full security risk assessment...
How To Arrange a Secure Office Relocation
There’s no denying how useful checklists can be. No matter the task in question, it’s always useful to have a black and white list of everything you need to have checked and completed to make a process run smoothly. It’s certainly no different when it comes to...
Unlocking the Value of Reverse Supply Chains with ITAD
IT asset disposal often entails responsibly removing redundant IT assets from business locations, but IT asset disposal can also be beneficial to your business, as well as a practical necessity. A professional ITAD vendor can help to unlock the maximum value of...
Recent Stories
Categories
Get in touch and see
how we can help.
Either fill in the form below or give us a call to speak to one of our friendly team.
Big Data and ITAD
'Big data' is a concept that refers to the large volumes of data at...
Electronic Asset Recovery: Uncovering the Value of Your IT Assets
Increasingly, there is a high turnover of IT assets across...
Environmentally Friendly ITAD
We speak so often about the importance of data protection in IT...
Security Risks to be aware of Before Relocating Offices
Office relocation might be an inevitable aspect of business growth,...
How To Arrange a Secure Office Relocation
There’s no denying how useful checklists can be. No matter the task...
Unlocking the Value of Reverse Supply Chains with ITAD
IT asset disposal often entails responsibly removing redundant IT...
Recent Stories
Categories
Get in touch and see
how we can help.
Either fill in the form below or give us a call to speak to one of our friendly team.




