IT Group was approached by a prestigious independent school which was troubled by libellous posting on Facebook.
(Image source: Eckersley Property)
We are delighted to announce that due to expansion and continued growth we will be moving our head office in Preston to a new location on Friday 19th February 2016.
Our new head office address is Unit 5 Lockside Office Park, Riversway, Preston, PR2 2YS.
It isn’t every day that a new security vulnerability is found that can claim to expose huge numbers of systems to attack, but 2015’s Heartbleed vulnerability opened the eyes of many in the security field that systems they have trusted for years may not always be as secure as they once believed.
A large software development company contacted IT Group in 2015 as they suspected two of their employees were developing software for another company. A forensic image and initial examination of the employees' computers was conducted with pre-agreed search terms from the client.
Computer forensic evidence first started to be applied to serious crime in the mid 80’s when personal computers started to be used in greater numbers and criminals deployed PCs for fraud and other crimes.
Consumers are growing wiser to what is considered an appropriate security protocol when they engage with an organisation, and now more than ever companies are making a point in their advertisements and on their websites that they will never ask for your password over the phone or ask you to submit account details from a link in an unwarranted email.
Hackers know that consumers are becoming more suspicious, especially when they receive an email that is littered with calls to action, encouraging them to click a link or ring a number to verify their account information.
Reconnaissance (recon) is a technique used by hackers where they directly focus on an organisation or an individual and gather intelligence that enables them to carry out a cyber attack.
During recon the hacker will always have a specific target, whether it be an organisation, personnel within the organisation or an individual. They will track and monitor specific behaviours to establish any vulnerabilities, potential routes of entry or weak points and they will then attempt to exploit these in order to gain access.