EOL IT Services has now merged with tier1 Asset Management Ltd

News & Views.

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Recent Stories

Things to Consider When Decommissioning a Data Centre

There are several different factors to consider when decommissioning a data centre, not just for a smooth operation and minimal risk, but also to ensure that you yield the maximum value from your IT assets. However, it’s not just your IT assets that you’ll need to...

Maximising Value from Your ITAD Reverse Supply Chain

Business technology is a wheel that never stops spinning. Each year the average speed of the computers available to buy increases, while data storage capabilities double on average. This results in a consistently high turnover of technology, as businesses strive to...

Chain of Custody: Do you know where your IT Assets are?

Since the GDPR came into play in 2018, businesses are highly aware of the importance of dealing with data appropriately to safeguard both business information and that of employees and clients. Secure passwords, 2-factor authentication (2FA) and anti-phishing training...

Categories

Get in touch and see
how we can help.

Either fill in the form below or give us a call to speak to one of our friendly team.

    Is Cyber Insurance Worth The Cost?

    You might think that cyber insurance is just another way for companies to make money out of businesses. However, according to one of the UK’s leading lawyers, cyber security could play a vital role in data protection policies, even though only one third of companies...

    What is Your Data Backup Strategy?

    Unfortunately, all hard drives have a shelf life, all of them will die eventually. Even if it isn’t a catastrophic failure that is the issue, a security breach may also lead to data loss. This means that it is vitally important for you to ensure that your data, both...

    Is Your AntiVirus Software Up To The Job?

    We are all aware, or so we presume, of the importance of having adequate antivirus (AV) software on our computers and laptops. AV software detects, prevents and disarms any malware, or viruses, that may be on your device and while it won’t necessarily solve all...

    How Secure Is Your Free Wireless Network?

    For most people, free Wi-Fi whilst out in public would pose very few if any possible problems at all. In fact, for the majority, it’s great: you can check your emails, check your social networking sites and even get some last minute work done in shopping centres,...

    The New EU Data Regulation, Are You Compliant?

    New regulations that are proposed across the 28 EU countries mean that organisations must be extra vigilant when it comes to data security. The concerning thing is that many companies are not even aware that they are losing data, let alone what type of data it is that...

    5 Data Security Issues to Manage in 2015

    It is expected that there will be issues connected with data security in any type of system that stores data online. However, throughout each year, there are more and more data security issues that we are warned of and it can be difficult to realise which pose a...

    Recent Stories

    Things to Consider When Decommissioning a Data Centre

    There are several different factors to consider when decommissioning a data centre, not just for a smooth operation and minimal risk, but also to ensure that you yield the maximum value from your IT assets. However, it’s not just your IT assets that you’ll need to...

    Maximising Value from Your ITAD Reverse Supply Chain

    Business technology is a wheel that never stops spinning. Each year the average speed of the computers available to buy increases, while data storage capabilities double on average. This results in a consistently high turnover of technology, as businesses strive to...

    Chain of Custody: Do you know where your IT Assets are?

    Since the GDPR came into play in 2018, businesses are highly aware of the importance of dealing with data appropriately to safeguard both business information and that of employees and clients. Secure passwords, 2-factor authentication (2FA) and anti-phishing training...

    Categories

    Get in touch and see
    how we can help.

    Either fill in the form below or give us a call to speak to one of our friendly team.

      Recent Stories

      Things to Consider When Decommissioning a Data Centre

      There are several different factors to consider when decommissioning a data centre, not just for a smooth operation and minimal risk, but also to ensure that you yield the maximum value from your IT assets. However, it’s not just your IT assets that you’ll need to...

      Maximising Value from Your ITAD Reverse Supply Chain

      Business technology is a wheel that never stops spinning. Each year the average speed of the computers available to buy increases, while data storage capabilities double on average. This results in a consistently high turnover of technology, as businesses strive to...

      Chain of Custody: Do you know where your IT Assets are?

      Since the GDPR came into play in 2018, businesses are highly aware of the importance of dealing with data appropriately to safeguard both business information and that of employees and clients. Secure passwords, 2-factor authentication (2FA) and anti-phishing training...

      Categories

      Get in touch and see
      how we can help.

      Either fill in the form below or give us a call to speak to one of our friendly team.