Monthly Archives: August 2017
Does Your Small Business Have a Cyber Security Plan?
Cyber security is composed of a variety of measures, processes, and technologies that work towards the protection of data and systems from cyber attacks. With business cyber attacks on the rise, companies can’t – and shouldn’t – ignore the threat … Continue reading
Retro Tech: Don’t Just Bin it!
2017 – The year that Nokia brought back the famous 3310 and when vinyl players couldn’t be cooler. However, your retro tech that has been in your attic since the 1970’s, could be less safe than you think. Thinking about … Continue reading
Service Spotlight: IT Asset Disposal
These days, most businesses have an awful lot of technology at their finger tips. Just take a look around your office and spot all of the IT equipment; you might see mobile phones, PCs, laptops, printers, and maybe even the … Continue reading
Tech Talk Tuesday
Here at ICT Reverse, we like to keep on top of our relevant news and what’s going on in the world of data, security and everything tech. From the leaking of a popular TV show to Facebook being in a … Continue reading
Top 10 Office Spaces
We come across a lot of office and work spaces on a day to day basis when collecting IT equipment. It’s fair to say some are a lot more inspiring than others! From start-ups to global giants, all businesses have … Continue reading
New term, new technology
With the new academic term just around the corner, schools, colleges and universities across the country are busy getting their IT suites up to standard with the support from ICT Reverse. There was a time when classrooms were dominated by … Continue reading
Competition Time!
It’s summer and we’re feeling generous so we offering one lucky winner the chance to get their hands on a £50 Selfridges voucher! Just head over to the ICT Reverse Facebook page to enter. The lucky winner will be picked … Continue reading
Service Spotlight: Data Erasure
Data erasure is increasingly more important for modern businesses, as it overwrites existing data on a determined storage device. The aim is to render the existing data unrecoverable, and this process doesn’t involve a simple file deletion. A simple deletion … Continue reading
Top 4 Business Cyber Attacks of all Time
Last year we saw cyber-attacks on the likes of Tesco Bank, Yahoo and even social media channels such as LinkedIn, Tumblr, and Myspace, and that’s just to name a few. A year on in technology and time, we are still … Continue reading
GDPR ready? New research suggests you probably aren’t…
GDPR is coming and it could be a disaster for organisations that are unprepared. Next May will finally see the much talked about General Data Protection Regulation (GDPR) come into effect. That is a data problem, right? Not relevant to … Continue reading
Categories
Archives
- October 2020
- January 2020
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017