by tier1 | May 26, 2015 | IT Security
As cyber criminals become more and more aware that targeting middle managers using social engineering tactics actually works, they will do so more often. Attackers are moving away from large scale consumer attacks and opting for more sophisticated attacks that take...
by tier1 | May 14, 2015 | IT Security
Any company that deals with data in the EU in any way will be aware of the imminent changes to the EU Data Protection Law. This will affect companies that have operations in the EU, store data of customers that live in the EU or deal with data that passes through the...
by tier1 | May 5, 2015 | IT Security
As the CEO of your business, would you be prepared to take responsibility for any failure of IT security within the company? If the answer is no, you need to be completely sure that every measure that could be put in place has been. According to research carried out...
by tier1 | Apr 28, 2015 | IT Security
In general, a business would wish to encourage as much traffic to their website as possible. Because leads result in visitors, and visitors will hopefully result in customers. The majority of the time this is the case, and website traffic is a positive thing. However,...
by tier1 | Apr 21, 2015 | IT Security
Considering it’s size, you would presume that Facebook would be subject, and adhere, to European data laws. However, as a result of Facebook’s (seemingly) unnecessarily complicated privacy policies and its continuous tracking of users, even when they are unaware of...
by tier1 | Apr 15, 2015 | IT Security
The issue of sufficiently protecting customer data is often talked about in the business world, and the debate over what is enough and what is too much is often difficult to settle on. But are you doing enough to protect your customers’ data? The Information...