identity theft


Weak Password

Passwords All Employees Should Avoid

Every year the security firm SplashData publishes a list of the most commonly used passwords from users based in America and Western Europe (where large scale data breaches...

Read More

Padlock on a laptop

Watchdog Urges UK to Change Data Security Policy

It was reported this week that a UK terror watchdog believes law enforcement in the UK need more powers when it comes to monitoring online activity. They have suggested...

Read More

Person Coding on a Laptop

Confidential Lawyer-Client Communications Endangered

MI5, MI6 and GCHQ are under the spotlight again, but this time for all the wrong reasons. It was revealed that UK intelligence agencies have been intercepting ‘private’ lawyer-client communications,...

Read More

RFID Barcode Scanner

RFID Technology: The Future of Our Offices?

Whilst most of us are still getting to grips with touch screens, some businesses are taking technology in the workplace to another place altogether; an office block in...

Read More

Security Leak Word Cloud

Former Employees and Data Leaks: The Enemy Within

Protecting your businesses’ information is not easy. It is a full time job that can prove to be highly demanding at the best of times. It is almost impossible...

Read More

Data Protection Word Cloud

The Road to Data Protection Reforms

In 1995 the European Union first implemented data protection regulations for its 15 Member States. Now 18 years later, with EU membership totalling 28 countries, the European Commission...

Read More

Page 1 of 2
1 2