November 20, 2020

Oracle 11g support expires on December 31st 2020

August 6, 2020

The New Office

July 16, 2020

The Power of Business Intelligence

June 18, 2020

The State of Email Security Report 2020

Email continues to be the most popular attack vector, via organizations at their email perimeters, from inside the organization (through compromised accounts, vulnerable insiders, social engineering) or beyond the organization’s perimeters (the domains they own and their brands via impersonation). Cyber threat actors and threat groups are continuously researching and testing out new tactics, techniques, and procedures (TTPs) in an attempt to overcome and exploit this increasingly sophisticated and complicated technology. To add to the complexity, many global corporations have been forced to adopt remote working policies for office-based employees to help ensure the safety of the workforce during the COVID-19 pandemic, and threat actors have followed them home. An increase in the variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information. The annual State of Email Security report 2020 gives you an overview of the current landscape we are all facing and a guide to help drive continuous improvement to your cyber resilience strategy.
June 15, 2020

Analyst Paper – Osterman Research Ten Questions to Ask About Your Office 365 Deployment

June 12, 2020

Analyst Paper- Osterman Research – The ROI of Security Awareness Training

June 12, 2020

Sophos 2020 Threat Report

June 9, 2020

Disposal or Recycle

So how can you securely dispose of your old or unused IT devices and hard drives? Every company wants to save the planet or at the very least would like to make a difference, but in these modern times with so much legislation and so many rules to adhere to how do you do it in an environmentally but secure way? With the continued growth of IT equipment to help with remote working, what do you have planned for your old or decommissioned assets? So much to consider and think about. Devices can potentially hold information equivalent to approximately 1,000,000 documents, so ensuring that this information is wiped completely, and everything is securely disposed of should be a key element of any disposal decision. Then there is the environmental impact to consider. Most devices contain enough heavy metals and toxic elements to pollute our air, land and water. They therefore simply can’t be put but in the “recycling or wheelie bin”, they must be disposed of in a responsible and environmentally friendly way. eacs has a number of solutions available which can help you simplify this process and ensure that you stay compliant and green, while still meeting GDPR regulations
June 7, 2020

Cyber Security Month

Staying secure against ransomware isn’t just about having the latest security solutions. People are invariably the weakest link in cyber security, with human error causing 90% of cyber data breaches in 2019 according to government figures, and cybercriminals are experts at exploiting normal human behaviours for their own personal gain. Therefore, good IT security practises are essential components of every organisation’s security setup.