EOL IT Services has now merged with tier1 Asset Management Ltd
News & Views.
We’ve Left the EU. Does GDPR Still Apply?
Untangling data protection policy, post-Brexit. The General Data Protection Regulation was the result of the biggest overhaul in European data protection legislation in 20 years. GDPR sought to standardise data privacy across all EU member states along with those...
Can WEEE Legislation Help Businesses Solve the E-waste Crisis?
71% of the world’s population is governed by e-waste legislation, yet the latest figures from the UN report that globally, only 17% of our electrical and electronic devices were recycled in 2019. At June’s G7 summit, world leaders were met by Mount Recyclemore. A vast...
Should Your Fridge Form Part of Your Cybersecurity Strategy?
Meeting the new challenges presented by the Internet of Things. It wasn’t so long ago that ‘personal data security’ meant shredding financial information and memorising your PIN. Fast-forward a decade and it has become necessary to share our sensitive data far and...
Can the Circular Economy Reboot the Technology Industry?
The environmental, social & economic benefits of reducing our e-waste. In 2020, the world generated a record 53.6 million metric tonnes (mT) of e-waste - in just 12 months. Weighing more than all the commercial airliners ever built, that waste had an...
Responding to the Global Computer Chip Shortage.
How Green IT can help beat rising costs and supply issues. Our digital devices are a central part of life, even more so in the last year. They’ve kept us connected and helped millions of businesses diversify their operations to stay afloat. Most would agree that our...
5 steps to Take in the Immediate Aftermath of a Cyber-attack?
Whether for substantial financial gain or to create social or political disorder, cyber-attacks are increasing in prevalence, severity and disruption. According to the Bitdefenders’ 2020 Threat Landscape Report, the total number of global ransomware reports increased...
Implementing a Multifaceted Enterprise Cybersecurity Strategy | EOL IT
Responding to the challenges of data governance posed by the modern IT network. Cybersecurity has changed exponentially in recent years, leaving CIO’s, CISO’s and their teams in very different waters, with the sudden shift to remote working last year only compounding...
OS updates: The Things We Should All Know Before Clicking ‘Snooze’.
Ask people why they should update their computers operating system, and most, if not all, will reply, ‘to keep the bad guys out and your sensitive data safe’. Although surprisingly, 40% of adults fail to update their computer or smartphones at all. We know that OS...
How Can You Ensure a Safe Transition Back to the Workplace?
5 Practical Steps to Help Businesses Reopen Securely. The UK Government’s roadmap out of lockdown has paved the way for businesses to start to think about reopening their doors to their employees. However, it is crucial that we stop to consider that we may also be...
4 Ways to Protect Your Remote Teams From Cyber-attack.
Managing the Escalating Threat from COVID-19. When the global Coronavirus pandemic struck, naturally businesses immediately focused on continuity of their service, customer retention and ultimately, survival. In March 2020, the UK government introduced strict...
Recent Stories
Categories
Get in touch and see
how we can help.
Either fill in the form below or give us a call to speak to one of our friendly team.
Meeting the Data Governance Challenges of the Hybrid Era.
Whereas previously, the concept of working from home was considered a privilege, often for those in more senior roles, necessity meant that it became the norm, literally overnight. The hybrid working benefits quickly became clear, as employees proved the conventional...
How to Improve Your Password Security.
We create an account for almost anything we do online, and we’ve become very accustomed to entering our personal details, seemingly with less consideration than before. But with so many accounts all requesting increasingly complex passwords, it can be difficult to not...
3 Vital Steps for Seamless Data Centre Decommissioning.
Globally, we produced and consumed an almost inconceivable 94 zettabytes of data in 2022 * – one zettabyte is equal to one billion terabytes. ^ An estimated 70 million servers house all of that data. + Whether an organisation has its own internal servers, rents server...
How Much Does a Data Breach Cost?
It’s no longer just money that makes the world go round, it is the data which drives and digitises our industry. Whilst it provides businesses with that all-important competitive advantage, it also undeniably paves the way for the biggest threat in a generation –...
The Differences Between Information Security & Cybersecurity.
You only need the internet to go down during a busy working day to remind you just how reliant we have become upon technology. With our heavy reliance on our advanced technological devices and the Internet of Things comes the need to manage the risk with a robust data...
3 Ways CISOs Can save Time.
Many Chief Information Security Officers accept that simply not having enough hours in the day comes with the territory. It is a constant juggling act between meetings, their resulting action points, the smooth running of your organisation’s IT department and not...
Recent Stories
Categories
Get in touch and see
how we can help.
Either fill in the form below or give us a call to speak to one of our friendly team.
Meeting the Data Governance Challenges of the Hybrid Era.
Whereas previously, the concept of working from home was considered...
How to Improve Your Password Security.
We create an account for almost anything we do online, and we’ve...
3 Vital Steps for Seamless Data Centre Decommissioning.
Globally, we produced and consumed an almost inconceivable 94...
How Much Does a Data Breach Cost?
It’s no longer just money that makes the world go round, it is the...
The Differences Between Information Security & Cybersecurity.
You only need the internet to go down during a busy working day to...
3 Ways CISOs Can save Time.
Many Chief Information Security Officers accept that simply not...
Recent Stories
Categories
Get in touch and see
how we can help.
Either fill in the form below or give us a call to speak to one of our friendly team.








