Articles by Sam Allcock

2 articles found

Celebrate Christmas and New Year the Nepali Way at Everest Inn Blackheath
Technology

Celebrate Christmas and New Year the Nepali Way at Everest Inn Blackheath

Blackheath’s locally loved restaurant, Everest Inn, renowned for its authentic Nepalese and Indian fusion cuisine is inviting diners to celebrate the festive season with a twist for 2025! From the 10th November – 23rd December, the restaurant wi l host Christmas Parties for groups of six or more, offering a choice of two or three-course seasonal menus complete with traditional spices, warm hospitality and festive decor. View the ful Christmas party menu here. Throughout December, Everest Inn wi l extend its opening hours to seven days a week, to accommodate the local community and celebrate in time for the Christmas and New Year For those looking to swap the traditional roast for something a little more adventurous, Christmas Day at Everest Inn promises an indulgent four-course menu whisking guests from Gurkhali Soup and Turkey Tikka to Five-Spiced Lamb Shank and Cod Loin before a sweet finish with Ginger and Cardamom Masala Tea. View the full Christmas day menu everest inn | fine nepalese cuisine – Everest Inn. As the year draws to a close, Everest Inn’s New Year’s Eve celebration is set to offer diners a relaxed yet luxurious experience. The evening wi l feature a ful à la carte and lunch specials menu, festive decor and the return of the restaurant’s much-loved Everest party hats. The night wi l conclude at 11pm, alowing the team to toast the New Year with their own friends and family and reflect on the wonderful memories and moments enjoyed on the Heath in 2025. The festive period at Everest Inn is set to be like no other – complete with spice, flair and a true Nepali experience. Seasonal Details: Christmas Parties 10th November – 23rd December Two-Courses £26pp | Three-Courses £30pp 3 Eden Business Centre | South Stour Avenue | Ashford | Kent | TN23 7RS | 01233 226519 Registered in England & Wales, Company Registration Number 0725967

Retired IT Equipment Emerges as Overlooked Cybersecurity Risk
Technology

Retired IT Equipment Emerges as Overlooked Cybersecurity Risk

As global organizations mark Cybersecurity Awareness Month, SK tes is sounding the alarm on a critical yet often ignored threat: the mishandling of end-of-life IT equipment. The Singapore-based firm, a leader in secure IT asset disposition (ITAD), is urging companies to treat retired hardware as a frontline cybersecurity concern—not just a logistical afterthought. “Every data breach doesn’t start with a hacker—it can start with a forgotten hard drive,” says Tom Hoof, Group IT Director at SK tes. The company has documented cases of routers resold with active network credentials and hard drives containing hospital records appearing in secondary markets. These incidents, SK tes argues, are not anomalies but symptoms of widespread process failures. Devices such as laptops, routers, and storage units often retain sensitive data long after decommissioning. A simple factory reset, commonly believed to be sufficient, fails to permanently erase data. Forensic tools can recover deleted files, leaving organizations exposed to breaches. Rising Risks from Digital Residue Recent investigations have revealed refurbished routers leaking corporate network information, firewall appliances exposing global configuration files, and hard drives with intact patient records sold publicly. These examples highlight the persistent threat posed by digital residue on outdated devices. To mitigate these risks, SK tes advocates for strict adherence to internationally recognized data destruction standards, including NIST 800-88 and IEEE 2883:2022. These frameworks mandate not only data erasure but also verification of irretrievability—a step often overlooked in routine IT asset disposal. “Secure data disposition must be treated as an integral part of an organization’s cybersecurity strategy,” Hoof adds. “It’s not the end of the IT lifecycle—it’s the final defense line against data compromise.” Compliance Failures and Legal Exposure Improper disposal of IT assets can lead to violations of major global data protection regulations such as GDPR, HIPAA, PCI DSS, NIS2, and DORA. These frameworks require strict controls over data storage, access, and destruction. Mishandling devices containing confidential information can result in multimillion-dollar fines, lawsuits, and reputational damage. The exposure risk extends beyond intellectual property. Personal health data, financial records, and proprietary business intelligence are all vulnerable. For sectors like healthcare, finance, and government, such breaches can erode public trust and disrupt operations. A Call to Action for IT and Compliance Leaders SK tes warns that many organizations lack visibility into the whereabouts and status of their decommissioned assets. During Cybersecurity Awareness Month, the company is urging CIOs, CISOs, compliance officers, and procurement teams to ask: “Do we know where our retired IT assets are—and what data might still be on them?” To help address this blind spot, SK tes has released a free “8-Point Checklist for Secure IT Asset Disposition,” available at www.sktes.com. The guide outlines essential steps for wiping, verifying, and disposing of data-bearing devices in accordance with global standards. About SK tes Founded in 2005 and now a subsidiary of SK ecoplant, SK tes operates more than 40 facilities across 22 countries. The company specializes in sustainable technology lifecycle services and advanced battery recycling, recovering critical materials for reuse in manufacturing supply chains. With a globally distributed network, SK tes ensures regulatory compliance, localized support, and reduced logistics costs. Its approach integrates cybersecurity, compliance, and environmental responsibility—helping organizations protect data while advancing a circular economy.