EOL IT Services has now merged with tier1 Asset Management Ltd

News & Views.

Jail for Illegally Exporting Electrical Waste

Its a first in the UK - a custodial sentence has been awarded for the illegal export of WEEE (waste electrical and electronic equipment). According to Gov.uk the offender, Joe Benson, has been sentenced to 16 months in prison for illegally exporting 46 tonnes of...

read more

Information Security – Principle 7

At EOL we are continually surprised to find that many organisations are unaware of their specific responsibilities outlined within Principle 7 of the Data Protection Act. So – in brief, what does the Data Protection Act say about information security and how does this...

read more

Security

All of EOL's vehicles are GPS tracked to provide the highest possible level of security.

read more

Recent Stories

How to Mitigate Against Accidental Insider Threats

Insider threats are a substantial threat across all sectors and industries; affecting organisations of any size. After all, all insiders have legitimate access to corporate systems and sensitive data. As such, insider cyber-attacks are harder to detect than...

5 Best Practices for Responsible ITAD.

5 Best Practices for Responsible ITAD.  The prospect of a data security breach has long been the 3am worry keeping most CISO’s awake at night. Whilst it is essential to protect company data at all costs following the introduction of EU and UK GDPR, ITAD isn’t solely...

Responsible Disposal of Lithium-ion Batteries.

The technology manufacturer's battery of choice, the lithium-ion (or li-ion) is the most commonly used battery in the world. It powers everything from our smartphones and electric vehicles (EV’s) to renewable energy farms. It has revolutionised our tech and been...

Categories

Get in touch and see
how we can help.

Either fill in the form below or give us a call to speak to one of our friendly team.

    4 Things to Consider Before Choosing an ITAD Partner

    Many businesses believe that they can deal with their IT asset disposal needs alone and, while this may be true for some companies, it’s a risky move for most. Not only is it important to protect your business data-- including sensitive client data-- while your...

    6 Best Practices to Prevent Data Leaks

    With the implementation of the GDPR earlier this year, the pressure for businesses to protect their data and prevent data leaks is stronger than ever. Not only is keeping data safe important for the protection of your business, it’s also important for safeguarding the...

    Why Your Business Should Invest in IT Asset Disposal

    Since the implementation of the General Data Protection Regulation (GDPR) earlier this year, there has been more pressure than ever for businesses to take steps to protect data at all stages of its life cycle, but there are also regulations and guidelines to protect...

    How ITAD Can Help to Improve Data Security

    Large organisations often find themselves needing to replace old IT assets, such as laptops, servers and data storage devices. However, this constant turnover of new and old IT assets can present a serious problem to data security. Data security is one of the key...

    Recent Stories

    How to Mitigate Against Accidental Insider Threats

    Insider threats are a substantial threat across all sectors and industries; affecting organisations of any size. After all, all insiders have legitimate access to corporate systems and sensitive data. As such, insider cyber-attacks are harder to detect than...

    5 Best Practices for Responsible ITAD.

    5 Best Practices for Responsible ITAD.  The prospect of a data security breach has long been the 3am worry keeping most CISO’s awake at night. Whilst it is essential to protect company data at all costs following the introduction of EU and UK GDPR, ITAD isn’t solely...

    Responsible Disposal of Lithium-ion Batteries.

    The technology manufacturer's battery of choice, the lithium-ion (or li-ion) is the most commonly used battery in the world. It powers everything from our smartphones and electric vehicles (EV’s) to renewable energy farms. It has revolutionised our tech and been...

    Categories

    Get in touch and see
    how we can help.

    Either fill in the form below or give us a call to speak to one of our friendly team.

      Recent Stories

      How to Mitigate Against Accidental Insider Threats

      Insider threats are a substantial threat across all sectors and industries; affecting organisations of any size. After all, all insiders have legitimate access to corporate systems and sensitive data. As such, insider cyber-attacks are harder to detect than...

      5 Best Practices for Responsible ITAD.

      5 Best Practices for Responsible ITAD.  The prospect of a data security breach has long been the 3am worry keeping most CISO’s awake at night. Whilst it is essential to protect company data at all costs following the introduction of EU and UK GDPR, ITAD isn’t solely...

      Responsible Disposal of Lithium-ion Batteries.

      The technology manufacturer's battery of choice, the lithium-ion (or li-ion) is the most commonly used battery in the world. It powers everything from our smartphones and electric vehicles (EV’s) to renewable energy farms. It has revolutionised our tech and been...

      Categories

      Get in touch and see
      how we can help.

      Either fill in the form below or give us a call to speak to one of our friendly team.