Latest Events

Catch up on previous events and webinars including our Optimise IT 2021 presentations on our YouTube channel below. 

December 18, 2020

Solarwinds Partner Update

December 11, 2020

EACS News – Issue 10

November 20, 2020

Oracle 11g support expires on December 31st 2020

November 13, 2020

eacs Advice on New Apple Big Sur (MacOS 11) Upgrade

October 26, 2020

eacs launches dedicated Digital Transformation Team in response to Covid-19

September 16, 2020

What if you don’t? Digital Transformation with the Power Platform

eacs in the news

January 20, 2021

Optimise 2020 – A Blueprint for Virtual IT Events in 2021

January 5, 2021

Sophos 2021 Threat Report

August 6, 2020

The New Office

July 16, 2020

The Power of Business Intelligence

June 18, 2020

The State of Email Security Report 2020

Email continues to be the most popular attack vector, via organizations at their email perimeters, from inside the organization (through compromised accounts, vulnerable insiders, social engineering) or beyond the organization’s perimeters (the domains they own and their brands via impersonation). Cyber threat actors and threat groups are continuously researching and testing out new tactics, techniques, and procedures (TTPs) in an attempt to overcome and exploit this increasingly sophisticated and complicated technology. To add to the complexity, many global corporations have been forced to adopt remote working policies for office-based employees to help ensure the safety of the workforce during the COVID-19 pandemic, and threat actors have followed them home. An increase in the variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information. The annual State of Email Security report 2020 gives you an overview of the current landscape we are all facing and a guide to help drive continuous improvement to your cyber resilience strategy.
June 15, 2020

Analyst Paper – Osterman Research Ten Questions to Ask About Your Office 365 Deployment

eacs Blogs

As an award winning and trusted provider of IT solutions to mid market organisations, we want to share our thoughts on a range of topics that will be affecting you on a daily basis.

Our thought provoking blogs are written by our highly experienced and knowledgeable team members and will be updated on a regular basis, ensuring they are relevant and touching upon real issues in the IT community.

Put your defences to the test with Continuous Security Validation
Cyber Security
By Marketing / August 3, 2022

Put your defences to the test with Continuous Security Validation

Put your defences to the test with Continuous Security Validation Penetration Testing can be a great way to test your...

Read More

At eacs, we see our role as a trusted advisor and expert in delivering IT and Services to the mid market and we are proud to be associated with some of the most informative and innovative suppliers and vendors in the IT Marketplace today.

Read some of our Datasheets below to find out more about the solutions eacs offers