by tier1 | Jul 20, 2015 | IT Security
It would be expected that there are data breaches within some companies, and, in the past, certain sectors may have been more likely to suffer breaches than others. However, according to the figures published in the Information Commissioner’s Office Data Breach Audit...
by tier1 | Jul 7, 2015 | IT Security
The Draft Communications Data Bill, otherwise known as the Snoopers’ Charter has been proposed by the Conservative Party following the recent general election. The party claim that the bill will aim to “provide the police and intelligence agencies with the tools...
by tier1 | Jun 30, 2015 | IT Security
The question as to whether or not the UK should leave, or remain a part of, the European Union is hot topic at the moment. People usually talk about the impact that an EU exit would have on trading within the UK, and how the UK’s immigration policy would be affected....
by tier1 | Jun 23, 2015 | IT Security
The recent messaging glitch that caused Apple products to crash was a hot topic in the news. Not only can this glitch effect iPhones, it also had the power to cause iPads and even Macs to crash if they received a malicious message. It is little more than a nuisance to...
by tier1 | Jun 16, 2015 | IT Security
We have all heard about malware that can infect and corrupt your system, putting customer data and sensitive information at risk. However, ransomware isn’t quite as widely talked about as other forms of malicious software. Ransomware is a type of malicious software...
by tier1 | Jun 9, 2015 | IT Security
BYOD, or Bring Your Own Device policies offer a plethora of opportunities and benefits to businesses at a surface level. Giving employees the ability to use just one device for work and personal use means that they remain contactable and able to do work wherever they...