by tier1 | Apr 28, 2015 | IT Security
In general, a business would wish to encourage as much traffic to their website as possible. Because leads result in visitors, and visitors will hopefully result in customers. The majority of the time this is the case, and website traffic is a positive thing. However,...
by tier1 | Apr 21, 2015 | IT Security
Considering it’s size, you would presume that Facebook would be subject, and adhere, to European data laws. However, as a result of Facebook’s (seemingly) unnecessarily complicated privacy policies and its continuous tracking of users, even when they are unaware of...
by tier1 | Apr 15, 2015 | IT Security
The issue of sufficiently protecting customer data is often talked about in the business world, and the debate over what is enough and what is too much is often difficult to settle on. But are you doing enough to protect your customers’ data? The Information...
by tier1 | Apr 7, 2015 | IT Security
Email policies may well be something that your company overlooks in terms of creating rules for employees. However, you might be surprised to know the importance of email policies, especially written policies, and how they can protect you in terms of liability and...
by tier1 | Mar 31, 2015 | IT Security
Mobile devices are becoming more and more popular recently, and they make working life a lot more straightforward. However, many mobile device users are blissfully unaware of the potential dangers surrounding them. Of course, a lot of the time this lack of knowledge...