by tier1 | Oct 20, 2015 | IT Security
For the majority of us, the delete key is simply a useful tool that means the data that we no longer need is out of our way. That said, most of us rarely take a moment to think about where those files go after we have hit the button. After all, if the data is not...
by tier1 | Oct 6, 2015 | IT Security
It is vital that your company has a process in place to deal effectively with End of Life data security. This security is important, not only for your own business data, but also for any data you may hold about your clients. An effective security system is important...
by tier1 | Sep 22, 2015 | IT Security, News
The constant evolution of technology and software is a given, and often happens at a rate that is difficult for most people to keep up with – staying on top of countless new developments can be exhausting! Unfortunately, the development of new software often means...
by tier1 | Sep 15, 2015 | IT Security
In the past, most hackers have relied on technological vulnerabilities to access and manipulate data illegally, but they are now beginning to play on social vulnerabilities to do just the same. The name of this newly popular practise is ‘social engineering’ – this is...
by tier1 | Sep 8, 2015 | IT Security
When you think of what hackers want, you probably think that they are after your most important financial data. However, security researchers have found that hackers are able to gain access to other pieces of important data on devices that you would never imagine...