EOL IT Services has now merged with tier1 Asset Management Ltd

News & Views.

Passwords and the Post It Note Culture

It’s becoming increasingly difficult to ignore the constant reminders about how important it is to keep online security at as a high a level as possible. However, even after this security obsession, we still continue to leave passwords to sensitive business systems...

read more

Is your business clued-up on security threats?

The Department for Business Innovation and Skills have recently published their research into Information Security Breaches for 2014, which details the level of threat experienced by businesses during 2013 and the risks associated with having an online presence. Their...

read more

ICO Warns That Data Use Is Getting Complicated and Costly

The Information Commissioner has warned today that its role has never been more important and that the general public has to have an independent regulator overseeing the handling of people’s personal data. At the launch of the Information Commissioner’s Office’s (ICO)...

read more

Jail for Illegally Exporting Electrical Waste

Its a first in the UK - a custodial sentence has been awarded for the illegal export of WEEE (waste electrical and electronic equipment). According to Gov.uk the offender, Joe Benson, has been sentenced to 16 months in prison for illegally exporting 46 tonnes of...

read more

Information Security – Principle 7

At EOL we are continually surprised to find that many organisations are unaware of their specific responsibilities outlined within Principle 7 of the Data Protection Act. So – in brief, what does the Data Protection Act say about information security and how does this...

read more

Recent Stories

Responsible Disposal of Lithium-ion Batteries.

The technology manufacturer's battery of choice, the lithium-ion (or li-ion) is the most commonly used battery in the world. It powers everything from our smartphones and electric vehicles (EV’s) to renewable energy farms. It has revolutionised our tech and been...

What Really Happens When You Hit Delete?

Our devices are an integral part of our everyday daily lives and as such, their use has become second nature. Every day we hit our computers delete button, sending it temporarily to the recycle bin, where it remains until we get around to methodically taking the...

Meeting the Challenges of a Hybrid Digital Infrastructure.

The rapid digital transformation of businesses has been the dominant IT trend of recent times. It provided companies across the globe with the necessary flexibility and agility they urgently needed to remain resilient in the face of persistent disruption. CISO’s put...

Categories

Get in touch and see
how we can help.

Either fill in the form below or give us a call to speak to one of our friendly team.

    The Cost of a Data Breach For Your Business in 2018

    Scary news stories about massive data breaches and even bigger fines seem to be more and more common these days, with Dixons Carphone the latest big business to fall victim, in a breach which involved 5.9 million payment cards and 1.2 million personal data records....

    4 Things to Consider Before Choosing an ITAD Partner

    Many businesses believe that they can deal with their IT asset disposal needs alone and, while this may be true for some companies, it’s a risky move for most. Not only is it important to protect your business data-- including sensitive client data-- while your...

    6 Best Practices to Prevent Data Leaks

    With the implementation of the GDPR earlier this year, the pressure for businesses to protect their data and prevent data leaks is stronger than ever. Not only is keeping data safe important for the protection of your business, it’s also important for safeguarding the...

    Why Your Business Should Invest in IT Asset Disposal

    Since the implementation of the General Data Protection Regulation (GDPR) earlier this year, there has been more pressure than ever for businesses to take steps to protect data at all stages of its life cycle, but there are also regulations and guidelines to protect...

    How ITAD Can Help to Improve Data Security

    Large organisations often find themselves needing to replace old IT assets, such as laptops, servers and data storage devices. However, this constant turnover of new and old IT assets can present a serious problem to data security. Data security is one of the key...

    Recent Stories

    Responsible Disposal of Lithium-ion Batteries.

    The technology manufacturer's battery of choice, the lithium-ion (or li-ion) is the most commonly used battery in the world. It powers everything from our smartphones and electric vehicles (EV’s) to renewable energy farms. It has revolutionised our tech and been...

    What Really Happens When You Hit Delete?

    Our devices are an integral part of our everyday daily lives and as such, their use has become second nature. Every day we hit our computers delete button, sending it temporarily to the recycle bin, where it remains until we get around to methodically taking the...

    Meeting the Challenges of a Hybrid Digital Infrastructure.

    The rapid digital transformation of businesses has been the dominant IT trend of recent times. It provided companies across the globe with the necessary flexibility and agility they urgently needed to remain resilient in the face of persistent disruption. CISO’s put...

    Categories

    Get in touch and see
    how we can help.

    Either fill in the form below or give us a call to speak to one of our friendly team.

      Recent Stories

      Responsible Disposal of Lithium-ion Batteries.

      The technology manufacturer's battery of choice, the lithium-ion (or li-ion) is the most commonly used battery in the world. It powers everything from our smartphones and electric vehicles (EV’s) to renewable energy farms. It has revolutionised our tech and been...

      What Really Happens When You Hit Delete?

      Our devices are an integral part of our everyday daily lives and as such, their use has become second nature. Every day we hit our computers delete button, sending it temporarily to the recycle bin, where it remains until we get around to methodically taking the...

      Meeting the Challenges of a Hybrid Digital Infrastructure.

      The rapid digital transformation of businesses has been the dominant IT trend of recent times. It provided companies across the globe with the necessary flexibility and agility they urgently needed to remain resilient in the face of persistent disruption. CISO’s put...

      Categories

      Get in touch and see
      how we can help.

      Either fill in the form below or give us a call to speak to one of our friendly team.