Cancer Research

Cancer Research is a nationally recognised charity leading the world in cancer research and development of new strategies to beat cancer. They employ many thousands of volunteers as well as carrying out research in 12 locations across the UK. There are 1400 staff based in Angel Building, London and EOL IT Services provide IT asset disposal services. The customer’s requirements are as follows:

  1. Compliance with data protection regulator ICO and use of CESG approved software – EOL utilise the industry leader in data erasure software, Blancco, which is approved to CESG standards. All staff are Blancco certified to carry out data erasure using the software.
  2. Compliance with all current and relevant environmental and WEEE legislation – EOL have the ability to dispose of all IT asset and electrical devices including white goods ensuring a complete disposal solution for work environments.
  3. Compliance with the latest ISO legislation and industry standards – EOL are ISO27001, ISO14001, ISO9001, OHSAS18001, BSEN 15713, BS7858 and ADISA Distinction Plus accreditation so exceeded the customer’s requirements in all aspects of legislation and standard.
  4. Ethical, environmental and behavioural compliance – EOL have their own standards for these areas but as part of our engagement we comply with the customer’s policies if they differ from our own
  5. Full inventory of kit being received and leaving premises – this is standard practice for all our collection services where we provide, within 24hrs of collection, a full inventory of all equipment collected including asset tag and serial numbers and make and model of all assets.
  6. Provision of waste transfer notes – under WEEE waste transfer notes are issued at the point of collection and with the booking in report.
  7. Tracking procedures and documentation for all IT assets – assets are tracked from point of handling at the customer’s site to the point of confirmation of data wiping and resale or confirmation of physical shredding. This includes our own fleet of GPS tracked vehicles ensuring full custody of assets while in transit.
  8. Destruction Certificates – We provide certification for data bearing assets and media such as tapes, hard drives and flash memory. The certificates confirm complete data destruction including a detailed list of the serial numbers for each hard drive.
  9. Allow an on-site inspection of the local supplier premises – a site inspection is in the pipeline for early 2015 to allow Cancer Research to visit our processing facility and audit our processes and procedures for IT Asset Disposal.

The level of data managed was official. EOL carried out other services such as peripheral disposal, and recycling of all IT assets following successful data wiping. All staff used in the end to end process are permanent employees of EOL IT Services with all being Security Cleared and CRB checked. The service is managed by an account manager including any planning and logistics for any services requested.

Each of the customer’s requirements was successfully delivered on time. Complying with all customer’s security and audit requirements as well as compliance with all regulatory standards for data management and asset disposal.

LATEST NEWS

Is Bloatware a Cybersecurity Risk?

Is Bloatware a Cybersecurity Risk?

Bloatware isn’t new but despite this, it remains unexpected by the majority of end-users when they excitedly unpack their new ‘clutter-free’ device. You may have found yourself wondering why the operating system takes up quite so much of the valuable storage you have just purchased – the chances are that much of your lost storage is due to bloatware.

What is bloatware?

Bloatware is the term for unwanted software that resides on your laptop or mobile devices. Whilst this can be inadvertently and unknowingly downloaded by the user, the term often refers to pre-installed applications. Rather than being helpful tools, these Potentially Unwanted Programs (PUPs) can be a burden.

There might be a program that you didn’t install or as the most common bloatware indicator, you might find that a device is running slowly, either intermittently or at start-up.

At best, these unnecessary applications take up your highly valuable storage space, they run in the background, chomping through RAM and battery capacity. They may also frequently send push notifications and pop-ups that promote in-app purchases. At worst, bloatware can put your cybersecurity at risk. Some bloatware has been found to have significant vulnerabilities that could hand hackers access to your network and your company data.

There may be applications that we expect as standard, but there are also third-party apps, we don’t want or need. We expect our smartphones to come with a clock, web browser and an app store, but don’t necessarily expect virtual assistants or games. This practice is common with android devices whereas Apple doesn’t add third-party software.

 

Why is bloatware pre-installed by manufacturers?

Whilst these default programs can genuinely add functionality, such as calendars or voice search, more often than not bloatware is added because it is a lucrative revenue stream. Very low-profit margins for manufacturers leave them seeking revenue from third-party partnerships. Plus, a device loaded with helpful music apps, social channels and security programs can command a higher price at point-of-sale.

For the software companies, this provides an easy route to market their product to their target consumers.

 

 

Types of bloatware.

There are two types of bloatware – software pre-installed by the manufacturer or additional programs that you have downloaded yourself.


Pre-installed software.

As an example, trialware is commonly used by manufacturers. They list their devices as having ‘free anti-virus’, but in reality and as the name suggests, this is a short-term trial. Once it ends, users are encouraged to buy a new licence. This is particularly effective with cybersecurity programs as it plays on people’s fears. It’s a particular concern for businesses who must abide by EU and UK GDPR, or risk a potentially crippling fine. However, if the trialware isn’t removed, it will continue to consume resources even if it isn’t used.

Not all pre-installed software is bloatware, however. We’d all be lost without many applications; our smartphones have almost rendered good old-fashioned alarm clocks, calculators and calendars obsolete.

Utility apps are used by manufacturers to promote their service that solves a problem of ours, such as navigation. Messaging apps, video/media players or editors, game centres, fitness or weather apps are all common bloatware or ‘junkware’.

 

Software downloads.

Bloatware can accompany software you have actively downloaded in packaged programs that have been bundled together. Whilst some may help you in your role, many go unopened – after all, you’ve no idea what it is or what it does. Yet it remains, clogging up your device.

When downloading any program, ensure it’s from an official platform or trusted app store. Whilst t&c’s can be long, never just click next. Often checkboxes are pre-ticked to download more so uncheck anything you don’t need.

 

Is bloatware a security risk?

As it’s often tucked away in the background, bloatware can be mistaken as malware or spyware. Whilst we are rightly suspicious of unknown files residing on our machines, in truth, the majority of bloatware isn’t malicious or unsafe, as such. It is mostly just annoying, slowing your machine and taking up a substantial amount of your drive.

That said, without regular updates, all software poses a security risk. And bloatware is rarely updated, particularly on laptops. After all, how do you update something that you don’t know is there?

Downloaded packages carry a higher cybersecurity risk; they are more likely to have purchase notifications and pop-up banners that could redirect you to suspicious sites. Adware is more likely to have been created with malicious intent. It can go unnoticed in legitimate programs or can unwittingly be installed if you happen to follow a malicious link.

Unfortunately, although cases are rare, this isn’t to say that there are never any issues with pre-installed bloatware.

In 2014, Lenovo’s pre-installed Superfish program, designed specifically to target consumers with pop-up advertisements was found to have serious security holes, making its users susceptible to man-in-the-middle attacks. Just two years later, the manufacturer’s updates gave Trojan viruses access to operating systems; Lenovo was forced to release an update that removed the software.

 

How do you remove bloatware?

Our hard drives are full of this digital debris. But before you set about deleting everything you don’t like the look of, consider that bloatware is subjective – if you use it and it is helpful, then it isn’t bloatware.

Whilst some manufacturer programs are difficult to uninstall most can be removed and if not disabled. A regular bloatware check is good practice, keeping your device running efficiently.

Remove it yourself.

When setting up a new machine, you’ll start by installing all the software you need, but it’s a great time to check what you don’t need, too. Third-party programs can be relatively easy to remove yourself.

Bloatware removal programs.

Even if you have disabled bloatware, it still takes space on your machine. There are both free and paid clean-up tools are available to continuously discover hidden bloatware, these programs can help speed up your slow machine if performance is consistently low.

Some bloatware applications are purposefully well-hidden in the system. Adware is particularly hard to detect – and therefore, far harder to eliminate. Some programs can even reappear after you have deleted them.  If it isn’t prominent on a device, it may need professional specialist software to identify it through an external supplier.

Outsource ITAD.

A painfully slow device causes a lot of frustration, but this often leads to businesses upgrading redundant IT assets before they really need to, in turn reducing lifetime value.

As part of their full lifecycle and update services, many IT asset disposal companies can help you discover and uninstall unnecessary applications. Not only will this speed up devices, which may have previously been destined for the end of life IT assets pile, but bloatware removal will also ensure you continue to protect company data. Professional data destruction services will provide an IT asset disposal accreditation for each piece of redundant IT equipment. This provides a secure ITAD chain of custody and helps you to remain compliant with data protection legislation.

Regular bloatware checks, removal and updates will ensure that you discover any vulnerabilities or malware residing on your system, which could pose a wider threat to your network and your business.

At the same time, your ITAD supplier can help you optimise performance and disk space and identify other unused or outdated applications to improve functionality. Also, if upgrading your device, a trusted ITAD partner can reduce your upgrade cycles without compromising on productivity. Contributing to the circular economy, this is a great boost to your company’s sustainability credentials as you reduce e-waste

 

 

On the surface, bloatware may appear to simply be an annoyance that degrades performance but unchecked, over time businesses will find that it can contribute to higher operational costs, lost productivity, loss of morale and increased upgrade cycles. In the worst-case scenario, unmonitored bloatware could mean you are vulnerable to potential cyber-attack and substantial data governance issues.

Whilst there is still no way to prevent bloatware in its entirety, you can limit the impact it has on your business’ productivity.

It is a good idea to restrict admin rights for employees so you can exercise caution when downloading any application internally. You should ensure that your IT audit processes include regular bloatware checks or that this is outsourced to a trusted ITAD partner to securely remove any unwanted applications, whilst maximising your efficiency and your cybersecurity.



EOL IT Services provide comprehensive data erasure, environmentally friendly ITAD and data centre decommissioning services. Our lifecycle management and upgrade services help businesses maximise their budget and boost productivity whilst operating more sustainably.

Find out how our data wiping services can support your organisation – contact us on 0845 600 4696 or visit www.eolitservices.co.uk


Resources.

Tech Target, Computer World, Clario, Kaspersky, Make Use Of, Mini Tool, Avast, VPN Mentor, Norton Security,

 

7 Questions to Ask Your ITAD Supplier.

7 Questions to Ask Your ITAD Supplier.

The growth of the cloud, the emergence of hybrid working and remote collaboration along with the soaring quantities of data-rich Internet of Things devices means that IT asset disposition no longer solely concerns the disposal of end of life IT assets. Today’s ITAD companies assist their clients with far more than secure data destruction services or data centre decommissioning. With sustainability at their core, many complete repairs and upgrades so devices can be redeployed, and when they cannot be assets are sanitised and recycled so they can be remanufactured.

As our use of data increases, it is essential to secure a long term, trusted affiliation with a reliable ITAD partner. This will help you manage your hardware lifecycle both sustainably and efficiently; alleviating pressure internally, reducing administration and boosting your IT budget. As ITAD specialists know data protection and e-waste legislation like the back of their hands, it will also provide substantial peace of mind when it comes to your legal compliance.

But how do you choose an ITAD partner? How can you assess whether they will meet your needs?

Questions to ask your ITAD supplier.

Whilst the term ITAD may be the same across the industry, not all IT asset disposition companies are equal, many offer different services.

You’ll find it beneficial to spend time thinking about your specific needs as a company along with any detailed questions to ask your ITAD supplier. The questions below will help you as you start to consider your individual requirements as a business.

Do you provide full lifecycle management?

Within such a detailed and complex field, a reliable client support structure is essential. A full-service partner will work with you through the lifecycle of your end-point hardware. Whether you are managing your refresh cycle or undertaking a large data centre decommissioning project, you will need to ensure that your ITAD support can tailor their service to your individual needs and circumstances – no two businesses are the same, after all. Flexibility is key; it is highly important that your new provider can adapt, and quickly if needed.

Data wiping services should do more than protect company data, dispose of redundant IT equipment and keep you compliant, they should be there to help make your life easier, too. In the true sense of the word partnership, leading IT asset disposition companies will help you with hardware asset planning. They’ll consider lifecycle management from a piece of equipment’s initial deployment, throughout its ongoing maintenance, updates, repair, all the way through to its inevitable eventual disposal.

Are you experienced in asset recovery?

While the focus throughout should remain on security and compliance, IT asset disposition companies will simultaneously be working to return meaningful revenue to your firm’s IT budget, helping you to sell your redundant IT assets, either as an entire asset or as separate components.

As experts in supply chain management and resale markets, your ITAD experts can advise whether you would secure a better residual return for your asset as it is, or whether it could make more if parts were harvested and resold as components to the remanufacturing industry. As it is a growing sector of the circular economy, the latter may generate a higher value for your business with efficient asset recovery becoming an unexpected revenue stream. Larger corporations could recoup tens of thousands of pounds, every year; therefore, it is important to find a provider who will research both options and advise you on the best time to sell.

 

Do you have a circular mindset?

The future of IT hardware is circular. Sustainability is becoming an important part of boardroom conversations as increasingly ethical consumers are demanding it. Look for an environmentally friendly ITAD provider with a strong ‘reduce, reuse, recycle’ ethos.

Whilst a regular refresh cycle drives efficiency, assets can be upgraded and redeployed internally as a cost-effective way to refresh your hardware, saving you significant sums. When internal redeployment isn’t possible, components with such little use should be reclaimed.

With record quantities of e-waste being generated and with a staggeringly low 17% currently being recycled, businesses should ensure that their end of life IT assets are being handled properly. Most UK IT asset disposition companies offer a zero-landfill policy.

 

Which industry accreditations do you hold?

Verified external accreditations have rigorous certification programs – they show that the ITAD provider has been officially recognised as a credible, knowledgeable authority. These stringent certifications show that the correct processes and industry best practice is followed at all times, guaranteeing your data security.

The leading accreditations to look out for are ADISA (Asset Disposal and Information Security Alliance), ISO 27001, the international standard for information security and when it comes to e-waste, ISO 14001, Environmental Management. However, it is also crucial to look for credentials that are specific to your industry and the types of services you require.

Larger organisations that outsource ITAD are likely to require on-site data erasure for business continuity purposes. In this case, your ITAD specialist should meet the CPNI standard for secure onsite data destruction services. Similarly, the CAS assessment demonstrates compliance with IS5; which is essential for any UK Government institution. Some IT asset disposal companies go above and beyond when it comes to gaining accreditations, so when looking for new support, it is certainly worth checking out their accreditations page.

How do you demonstrate regulatory compliance?

You should also ask your potential ITAD partner about their own workflows or what technologies they use? How stringent are their internal processes and checks to prevent human error?

All IT asset disposition services should be fully up to speed with all EU and UK GDPR data destruction requirements, the WEEE legislation and any amendments, as they are governed by them also. They should provide an IT asset disposal accreditation certificate for each asset to demonstrate your ITAD chain of custody. But to prevent data security issues, the importance of data governance extends beyond compliance at national, political or economic borders. Can the ITAD service demonstrate compliance with your organisation’s specific sector regulations? Can they meet the demands of ITAD in the financial industry or ITAD in the healthcare industry, for example?

Do you offer mobile device recycling?

The UK has the second-highest smartphone penetration rate, globally, (78.9%*) Email correspondence using a smartphone was the most frequent internet activity*. That’s a lot of data.

When it comes to our business assets, it’s vital that your smartphones and tablets form part of your company’s IT asset disposal policy. Your data is not erased with a factory reset – a very common ITAD myth. So, it is good to make sure your IT asset disposal company has mobile device recycling as a service.

How secure are your own facilities?

Whilst it would be fair to assume that ITAD businesses operate from highly secure facilities, it is never a bad idea to check. Is there 24/7 security? Are there state of the art cameras both internally and externally? If your assets are to be transported by their specialist technicians from your workplace to their ITAD facility, do they have their own fleet of GPS-tracked vans?

 

It is your legal responsibility to protect company data at all costs, so in short, do not be afraid to undertake thorough research when you are looking for an ITAD supplier – ask questions and even for client references.

Once appointed, a statement of works document can specify the responsibilities of the ITAD service, how you will work together, and how all processes including data erasure, upgrades, redeployment, recycling and remanufacturing will be managed. It is important to look for a provider with a demonstrable track record and clients that have remained with them for many years. However, one of the most overlooked considerations is that ITAD is a long-term partnership that requires an ongoing commitment to trust, full transparency, security, quality and the utmost confidentiality at all times.

*CyberCrew,  

 

With responsiveness and reliability, EOL IT Services provide comprehensive environmentally friendly ITAD, helping businesses avoid any future data security issues. Ask us about our free IT asset disposal service.

Find out how our data wiping services can support your organisation – contact us on 0845 600 4696 or visit www.eolitservices.co.uk  

   


Resources.

ApTo Solutions, Horizon Technology, HubSpot, Cyber Crew, EOL IT Services, Seam Services, Super Micro,

 

 

Sustainable Power Management – A Best Practice Guide.

Sustainable Power Management – A Best Practice Guide.

Our customers and business associates alike are now actively looking to do business with eco-friendly brands. Businesses are recognising the importance of these changing values and their marketing teams are keen to demonstrate their green credentials. Whilst sustainability was once seen to be in conflict with business efficiency and profit, it is now widely recognised as being good for business and your bottom line.

As internet use continues to sky-rocket, the information industry has led to an explosion in energy use. Our transition towards cloud-working has seen energy consumption in the IT sector soar on a global scale with many businesses seeking ways to step up their sustainability efforts.

Concurrently, with energy prices at a record high, the need to reduce business overheads has never been more in focus as organisations continue to recover from the economic downturn following the pandemic.

Sustainable IT best practice measures can be implemented both immediately and in the near future to help businesses operate in an environmentally responsible manner and mitigate the impact of the spiralling energy costs in the long-term.

What is sustainable IT?

Put simply, sustainable IT or green IT is an approach which minimises the IT department’s impact on the environment. Whilst this covers the manufacturing process and responsible disposal, device lifetime usage plays a substantial part due to energy consumption. In some organisations, where there’s no facilities management team, IT can also assume responsibility for amenities, such as lighting and air conditioning.

 

What are the advantages of sustainable practices in the workplace?

It goes without saying that the biggest advantage of adopting more responsible working practices is to protect our environment and limit global warming. We’ve all known the benefits of using energy-efficient LED lighting or turning the thermostat down a notch for some time, but beyond this, what can businesses do to reduce their energy consumption, reduce costs and follow sustainable best practice?


Know your energy use.

When making reductions, it’s important to have a benchmark, monitoring progress towards a target. You might switch to a 100% renewable energy supplier and install a smart meter to see how much your business is spending on energy each day. If you don’t have a smart meter, make sure you submit monthly meter readings – this helps avoid over estimated bills.

Achieve buy-in.

Electing a member of staff to oversee the reductions will ensure the project remains a priority. Although ultimately, your entire team is responsible.

Achieving widespread buy-in throughout your entire organisation is crucial when it comes to establishing energy-efficient practices. Ask your employees for their innovative energy-saving ideas; this encourages a cultural shift towards more sustainable practices.

Old habits die hard, especially for busy employees, so it’s only natural that a change of mindset may take a little time. You can prevent forgetfulness adding to your electricity bill, however.

Automation and settings.

Just as motion sensors make sure that rooms aren’t unnecessarily lit, the use of smart plugs or gangs will ensure that unused equipment is turned off. Excluding the fridge, the servers and its cooling equipment, most electrical devices could automatically power down after-hours.

You can use shortcut settings to set individual machines to hibernate with one press of the power button or close a laptop screen. Although employees are used to locking their computer when they leave their workstations, few hit the monitor power button when heading to lunch or into a meeting. Whilst your employees get into the habit of being more energy-conscious, you can provide a backup by setting all screens to a 10-minute time-out and removing any obsolete screensavers.

According to research by Harvard University, reducing your computer monitor’s brightness from 100 to 70% will save 20% of the screen’s energy. When monitors need replacing, an LCD display can save up to 70% in energy costs. +

Maximise lifetime value.

 

More than 160,000 laptops are disposed of every single day in the EU alone. What’s more, a staggering 70% of those could be reused.

Circular Computing.

 

When our technology starts to show signs of inefficiency, more often than not this can be improved by upgrading components to regain near maximum efficiency. A recent study from Cranfield University showed that when tested, leading branded re-manufactured laptops offered 97% performance when compared to a brand-new model. Crucially, this delivered a 40% saving when upgrading. ** This is one of the questions to ask your ITAD provider; many now offer an upgrade service alongside data destruction services; particularly helpful if upgrading at scale, which can result in a substantial business savings.

Short lifecycles and limited warranties have led us to a culture of ‘take, make, use and dispose’. By adopting the ‘reduce, reuse, recycle’ approach, businesses can maximise their ROI for devices that would have previously been considered redundant IT assets. Upgrading components rather than the entire device is highly cost-effective. It also actively demonstrates your commitment to the circular economy and your contribution to the UN Sustainable Development Goals.

Buy new (and dispose) responsibly.

Even with an extensive upgrade program, there will always be end of life IT assets. When it becomes necessary to purchase new equipment, energy-efficient devices are likely to be high on the specification list as you replace energy-hungry hardware. You should also look to only buy from other sustainable brands. However, thought must also be given to asset longevity.

Forming part of the EU’s Circular Economy Action Plan, new models should be designed with repair in mind from the outset. By choosing models that have been designed to be renewed or rebuilt, you are also making a long-term commitment to your future upgrade policy.


Redundant IT equipment should always be disposed of responsibly. In 2021, it is estimated that the world produced 57.4 million metric tonnes of https://www.eolitservices.co.uk/2021/11/30/5-best-practices-for-responsible-itad/e-waste, an increase of 4 million mT from the 53 million mT generated in 2020. We’re on a projected course to reach 74 Mt by 2030*.

Governed by the EU’s WEEE regulations, IT asset disposition companies are experts in the remanufacturing marketplace and are able to secure the very best residual values for recycled components – some even offer free IT asset disposal. It’s the ethical thing to do but can provide a new business revenue stream. By using an ITAD partner, you’ll ensure your equipment has undergone professional data erasure in line with EU and UK GDPR data destruction requirements, and that individual assets are issued with an IT asset disposition accreditation.

Reducing data storage.

40% of the energy used in our data centres is to power cooling equipment; this can be as high as 80% in warmer climates. ^ As a result, the environmental impact of our data storage is significant.

Many companies have transitioned much or all of their data storage to the cloud. This reduces that company’s direct energy consumption; however, the information is still stored elsewhere. Whilst emissions can be offset, by planting trees, for example, reducing the total amount of storage would be better.

Most companies store thousands of files that they’ll never need again, have no value and serve no purpose. The cost of storing this unnecessary data will definitely outweigh the need to keep it. How many duplicated files are there backing up every day? Compression can also help reduce storage by eliminating bytes and repetitions. Once reduced, it’s important to have processes to stop it from building up again, such as automated deletion after a set period.

Digital decluttering often results in excess storage. If you find yourself in this position, it is important to instruct data centre decommissioning experts to provide an all-important ITAD chain of custody. Out of hours, on-site data erasure will also ensure there is little or no business downtime.

Wireless charging.

It’s worth asking employees to switch back to wired smartphone chargers. Although popular, wireless chargers are far less power-efficient and often twice to three times slower. A 2020 side-by-side test found that wireless charging uses an average of 47% more power to charge fully. #

Wireless chargers emit an electromagnetic search signal to constantly check for a compatible device so they are on stand-by and drawing power all the time.


Embrace hybrid working.

The numbers of home offices doubled in 2021 as many made the temporary switch to remote or hybrid-working permanent. ++ Fewer employees in the office mean fewer computers, monitors, lights, air-con and the kettle will be boiled less, mounting up to considerable cost-savings. You may not need all that expensive office space and downsize to a new office with the support of secure office relocation services.

Businesses are recognising the operational benefits of embedding a sustainable ethos throughout.

Power management best practice is just one way to create a sustainable IT department. Not only does this benefit the environment, but it also ensures businesses keep pace with consumer values and demand, so they continue to grow despite the continued pressures faced.

Going green will increase your business efficiency and increase productivity whilst saving you money, and boosting your bottom line.

*WEEE Forum, **Circular Computing, +Computer Disposals, ++Zorlogics, #Tech Evaluate, ^CDL,

 

Helping businesses avoid any future data security issues, EOL IT Services provide comprehensive environmentally friendly ITAD, upgrade services and free IT disposal when equipment reaches end of life.

Our secure office relocation and on-site data centre decommissioning services ensure that disruption is minimal – ask us about our out of hours service.

Find out more about our secure data wiping services – contact us on 0845 600 4696 or visit www.eolitservices.co.uk  


Resources.

Axiom Workplaces, WEEE Forum, iNews, Circular Computing, Business Electric, Computer Disposals, American Express, Zorlogics, Tech Evaluate, CDL, The Independent, The BBC, Planet Earth Cleaning, Conserve Energy Future, Tech Times,

 

 

To arrange a demonstration then please complete the form below and we will be in touch to arrange a convenient appointment:

[cf7lead cf7_id=”595″ fields=”Company=company|Email=email|Phone=telephone|First Name=fname|Last Name=lname”]

Protect My Data:

Complete the form below and we will be in touch.

[cf7lead cf7_id=”3320″ fields=”Company=company|Email=email|Phone=telephone|First Name=fname|Last Name=lname”]

Request Information:

Complete the form below and we will be in touch.

[cf7lead cf7_id=”3378″ fields=”Company=company|Email=email|Phone=telephone|First Name=fname|Last Name=lname” title=”Request Information Form”]

    First Name

    Last Name

    Email

    Company