by tier1 | Sep 22, 2015 | IT Security, News
The constant evolution of technology and software is a given, and often happens at a rate that is difficult for most people to keep up with – staying on top of countless new developments can be exhausting! Unfortunately, the development of new software often means...
by tier1 | Sep 15, 2015 | IT Security
In the past, most hackers have relied on technological vulnerabilities to access and manipulate data illegally, but they are now beginning to play on social vulnerabilities to do just the same. The name of this newly popular practise is ‘social engineering’ – this is...
by tier1 | Sep 8, 2015 | IT Security
When you think of what hackers want, you probably think that they are after your most important financial data. However, security researchers have found that hackers are able to gain access to other pieces of important data on devices that you would never imagine...
by tier1 | Sep 3, 2015 | IT Security
When it comes to hacking, it is not just large scale or global businesses that are at risk – small businesses are equally likely to fall victim to this threat. This danger became very apparent following the Target department store breach in 2013, an event that...
by tier1 | Aug 10, 2015 | IT Security
We carry our mobile devices almost everywhere, making them the perfect place to store data we need to regularly access: website logins, banking passwords, client contact details, photos and videos. Sometimes it is not the devices themselves that are the attraction,...
by tier1 | Jul 28, 2015 | IT Security
Unfortunately, there are more data breaches within businesses than desirable. Often, these data breaches will result simply with a lesson learned, rather than any legal action being taken. However, it is important to always be prepared for the possibility of customers...