EOL IT Services has now merged with tier1 Asset Management Ltd

News & Views.

Can Remote Workers Put Your Business At Risk?

The ability for employees to do work from home or other locations outside of the office is very useful, but there are risks associated with it. Especially if  the correct security measures have not been put in place and communicated to the employee. Poor security and...

read more

Is that USB Flash Drive a Security Risk?

USB Flash Drives are so useful and so commonly used by most of us today that it would be difficult to imagine a world of computers without them. However, in spite of their benefits, there is a possibility that they also pose a security threat by result of a...

read more

Passwords and the Post It Note Culture

It’s becoming increasingly difficult to ignore the constant reminders about how important it is to keep online security at as a high a level as possible. However, even after this security obsession, we still continue to leave passwords to sensitive business systems...

read more

Is your business clued-up on security threats?

The Department for Business Innovation and Skills have recently published their research into Information Security Breaches for 2014, which details the level of threat experienced by businesses during 2013 and the risks associated with having an online presence. Their...

read more

ICO Warns That Data Use Is Getting Complicated and Costly

The Information Commissioner has warned today that its role has never been more important and that the general public has to have an independent regulator overseeing the handling of people’s personal data. At the launch of the Information Commissioner’s Office’s (ICO)...

read more

Jail for Illegally Exporting Electrical Waste

Its a first in the UK - a custodial sentence has been awarded for the illegal export of WEEE (waste electrical and electronic equipment). According to Gov.uk the offender, Joe Benson, has been sentenced to 16 months in prison for illegally exporting 46 tonnes of...

read more

Recent Stories

How Can Your Business Prevent Mobile Malware Attacks?

Smartphones, tablets and the Internet of Things are great business enablers when it comes to being super responsive to the needs of your customers. Our working lives are more convenient; the technology has increased productivity at restaurant and boardroom tables,...

How to Mitigate Against Accidental Insider Threats

Insider threats are a substantial threat across all sectors and industries; affecting organisations of any size. After all, all insiders have legitimate access to corporate systems and sensitive data. As such, insider cyber-attacks are harder to detect than...

Categories

Get in touch and see
how we can help.

Either fill in the form below or give us a call to speak to one of our friendly team.

    The Benefits of Hiring an ITAD Partner

    It’s only natural that as your business grows and changes so will your IT needs, but it’s important that you deal with your redundant IT equipment effectively. Not only is this important for the sake of GDPR compliance, it’s also vital to protect your business data....

    The Importance of IT Asset Disposal to Data Security

    Not only is it important to take data security seriously for the sake of compliance with the GDPR, it’s also important for the sake of protecting your business from potential hacks and cyber attacks. There are many ways in which you can ensure data security, from...

    The Cost of a Data Breach For Your Business in 2018

    Scary news stories about massive data breaches and even bigger fines seem to be more and more common these days, with Dixons Carphone the latest big business to fall victim, in a breach which involved 5.9 million payment cards and 1.2 million personal data records....

    4 Things to Consider Before Choosing an ITAD Partner

    Many businesses believe that they can deal with their IT asset disposal needs alone and, while this may be true for some companies, it’s a risky move for most. Not only is it important to protect your business data-- including sensitive client data-- while your...

    Recent Stories

    How Can Your Business Prevent Mobile Malware Attacks?

    Smartphones, tablets and the Internet of Things are great business enablers when it comes to being super responsive to the needs of your customers. Our working lives are more convenient; the technology has increased productivity at restaurant and boardroom tables,...

    How to Mitigate Against Accidental Insider Threats

    Insider threats are a substantial threat across all sectors and industries; affecting organisations of any size. After all, all insiders have legitimate access to corporate systems and sensitive data. As such, insider cyber-attacks are harder to detect than...

    Categories

    Get in touch and see
    how we can help.

    Either fill in the form below or give us a call to speak to one of our friendly team.

      Recent Stories

      How Can Your Business Prevent Mobile Malware Attacks?

      Smartphones, tablets and the Internet of Things are great business enablers when it comes to being super responsive to the needs of your customers. Our working lives are more convenient; the technology has increased productivity at restaurant and boardroom tables,...

      How to Mitigate Against Accidental Insider Threats

      Insider threats are a substantial threat across all sectors and industries; affecting organisations of any size. After all, all insiders have legitimate access to corporate systems and sensitive data. As such, insider cyber-attacks are harder to detect than...

      Categories

      Get in touch and see
      how we can help.

      Either fill in the form below or give us a call to speak to one of our friendly team.