by tier1 | Jun 16, 2015 | IT Security
We have all heard about malware that can infect and corrupt your system, putting customer data and sensitive information at risk. However, ransomware isn’t quite as widely talked about as other forms of malicious software. Ransomware is a type of malicious software...
by tier1 | Jun 9, 2015 | IT Security
BYOD, or Bring Your Own Device policies offer a plethora of opportunities and benefits to businesses at a surface level. Giving employees the ability to use just one device for work and personal use means that they remain contactable and able to do work wherever they...
by tier1 | May 26, 2015 | IT Security
As cyber criminals become more and more aware that targeting middle managers using social engineering tactics actually works, they will do so more often. Attackers are moving away from large scale consumer attacks and opting for more sophisticated attacks that take...
by tier1 | May 14, 2015 | IT Security
Any company that deals with data in the EU in any way will be aware of the imminent changes to the EU Data Protection Law. This will affect companies that have operations in the EU, store data of customers that live in the EU or deal with data that passes through the...
by tier1 | May 5, 2015 | IT Security
As the CEO of your business, would you be prepared to take responsibility for any failure of IT security within the company? If the answer is no, you need to be completely sure that every measure that could be put in place has been. According to research carried out...