EOL IT Services has now merged with tier1 Asset Management Ltd

News & Views.

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Recent Stories

Secure Remote Working Best Practices – Broadband and Access

The reasons for the huge increase in home working are recognised and well documented. Home working is a necessity for the foreseeable future, and its forced adoption is most likely the precursor to a seismic shift in working practises, away from offices and into the...

Reducing Your Company’s Carbon Footprint with ITAD

We all have a carbon footprint, individuals and businesses alike. This ‘footprint’ is a measure of the carbon dioxide released into the atmosphere as a result of your actions. From the transport you take and the food you eat, to the clothes you wear and the technology...

How to Protect Your End of Life IT Assets

Businesses are familiar with the importance of protecting IT equipment, and any data on devices, when they are in good working order, but there is less general awareness when it comes to the security of end of life IT assets. Whether you intend to resell, recycle or...

Categories

Get in touch and see
how we can help.

Either fill in the form below or give us a call to speak to one of our friendly team.

    Four Questions to ask Your ITAD Provider

    Whether you are undergoing a refresh, relocating offices or beginning your journey to the cloud, you will need to ensure that your data is dealt with securely and for this, you will need to ensure that you engage with a reliable data processor.  With so many companies...

    What the GDPR means for IT Disposal

    The GDPR, or General Data Protection Regulation, will come into force in May 2018. The regulation, set by European Parliament, intends to strengthen and unify data protection regulations across the EU. Much of what the new regulation legislates for is covered by the...

    MIFID II For Dummies: How Will It Affect Your Business?

    MIFID II For Dummies: How Will It Affect Your Business?

    There are a number of new and updated regulations coming into place in 2018, leading many businesses to seriously reconsider their approach to data security and how they manage sensitive data. We have heard plenty about the GDPR (General Data Protection Regulation)...

    Cyber Security for your Business: Keeping Your Data Safe

    For most businesses, providing your staff access to the internet is essential for them to work effectively. However, along with the benefits this brings, there are also several cyber security risks, especially in terms of your business data security. This means that...

    Security Limitations of the Solid State Drive

    The expansion and innovation of storage mediums has been a priority since the start of personal computing. While some of the traditional hard drives, HDDs, have remained much the same for over 50 years, faster and more efficient storage technologies, such as SSDs,...

    How to Dispose of a Company Computer Securely

    In today’s increasingly digital world, computers are indispensable to most companies. Not only do they allow employees to do their jobs, computers are also used to store sensitive data about the company, its employees and its clients. This means that when your company...

    Recent Stories

    Secure Remote Working Best Practices – Broadband and Access

    The reasons for the huge increase in home working are recognised and well documented. Home working is a necessity for the foreseeable future, and its forced adoption is most likely the precursor to a seismic shift in working practises, away from offices and into the...

    Reducing Your Company’s Carbon Footprint with ITAD

    We all have a carbon footprint, individuals and businesses alike. This ‘footprint’ is a measure of the carbon dioxide released into the atmosphere as a result of your actions. From the transport you take and the food you eat, to the clothes you wear and the technology...

    How to Protect Your End of Life IT Assets

    Businesses are familiar with the importance of protecting IT equipment, and any data on devices, when they are in good working order, but there is less general awareness when it comes to the security of end of life IT assets. Whether you intend to resell, recycle or...

    Categories

    Get in touch and see
    how we can help.

    Either fill in the form below or give us a call to speak to one of our friendly team.

      Recent Stories

      Secure Remote Working Best Practices – Broadband and Access

      The reasons for the huge increase in home working are recognised and well documented. Home working is a necessity for the foreseeable future, and its forced adoption is most likely the precursor to a seismic shift in working practises, away from offices and into the...

      Reducing Your Company’s Carbon Footprint with ITAD

      We all have a carbon footprint, individuals and businesses alike. This ‘footprint’ is a measure of the carbon dioxide released into the atmosphere as a result of your actions. From the transport you take and the food you eat, to the clothes you wear and the technology...

      How to Protect Your End of Life IT Assets

      Businesses are familiar with the importance of protecting IT equipment, and any data on devices, when they are in good working order, but there is less general awareness when it comes to the security of end of life IT assets. Whether you intend to resell, recycle or...

      Categories

      Get in touch and see
      how we can help.

      Either fill in the form below or give us a call to speak to one of our friendly team.