June 25, 2020

Comms Business Live – Raising Finance during COVID

June 18, 2020

The State of Email Security Report 2020

Email continues to be the most popular attack vector, via organizations at their email perimeters, from inside the organization (through compromised accounts, vulnerable insiders, social engineering) or beyond the organization’s perimeters (the domains they own and their brands via impersonation). Cyber threat actors and threat groups are continuously researching and testing out new tactics, techniques, and procedures (TTPs) in an attempt to overcome and exploit this increasingly sophisticated and complicated technology. To add to the complexity, many global corporations have been forced to adopt remote working policies for office-based employees to help ensure the safety of the workforce during the COVID-19 pandemic, and threat actors have followed them home. An increase in the variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information. The annual State of Email Security report 2020 gives you an overview of the current landscape we are all facing and a guide to help drive continuous improvement to your cyber resilience strategy.
June 15, 2020

Analyst Paper – Osterman Research Ten Questions to Ask About Your Office 365 Deployment

June 12, 2020

Analyst Paper- Osterman Research – The ROI of Security Awareness Training

June 12, 2020

Sophos 2020 Threat Report

June 9, 2020

Disposal or Recycle

So how can you securely dispose of your old or unused IT devices and hard drives? Every company wants to save the planet or at the very least would like to make a difference, but in these modern times with so much legislation and so many rules to adhere to how do you do it in an environmentally but secure way? With the continued growth of IT equipment to help with remote working, what do you have planned for your old or decommissioned assets? So much to consider and think about. Devices can potentially hold information equivalent to approximately 1,000,000 documents, so ensuring that this information is wiped completely, and everything is securely disposed of should be a key element of any disposal decision. Then there is the environmental impact to consider. Most devices contain enough heavy metals and toxic elements to pollute our air, land and water. They therefore simply can’t be put but in the “recycling or wheelie bin”, they must be disposed of in a responsible and environmentally friendly way. eacs has a number of solutions available which can help you simplify this process and ensure that you stay compliant and green, while still meeting GDPR regulations

Events

We have more than 25 years experience serving a variety of clients helping them achieve their goals through the innovative use of IT.

See below for a list of the latest events eacs is involved in.

eacs Blogs

As an award winning and trusted provider of IT solutions to mid market organisations, we want to share our thoughts on a range of topics that will be affecting you on a daily basis.

Our thought provoking blogs are written by our highly experienced and knowledgeable team members and will be updated on a regular basis, ensuring they are relevant and touching upon real issues in the IT community.

Patching
By Marketing / June 29, 2020

Third Party Patching

So how can we patch non-Microsoft applications?  Patching Windows, Office and the rest of the Microsoft stack of software is...

Read More

At eacs, we see our role as a trusted advisor and expert in delivering IT and Services to the mid market and we are proud to be associated with some of the most informative and innovative suppliers and vendors in the IT Marketplace today.

Read some of our Datasheets below to find out more about the solutions eacs offers