Employee competition – protecting your business' interests

Employers will welcome the new statutory protection to stop competitors stealing confidential information

Businesses neglect cyber security

Just three in 10 (29%) firms have written cyber security policies

Senior-level exits: Is there ever a trouble-free way?

It's not uncommon for business relationships to break down, so employers need appropriate protection

The truth behind the headlines: it's still not legal to snoop on staff

Contrary to some reports, the case does not set a precedent for employers to monitor, carte blanche, employees' private messages

The digital age makes proving breach by departing employees easier

Employers need to be aware of the increasing risks of removal of confidential information by departing employees

Does your business have a false sense of security?

Various big-name businesses have recently been targeted by hackers. But how (and why) does this keep happening?

Top five tips for data security

What you need to know about keeping your organisation's data safe

Why social networking carries more risk than you realise

As millions of users of dating website Ashley Madison lay awake sweating about who will be reading the now freely available data on their indiscretions, those who use more innocent-seeming social...

IT security staff in high demand

Almost half (47%) of chief information officers expect to appoint additional IT security personnel to their teams this year

Are your employees seizing their last chance to cheat?

Do you scrutinise contractor invoices more closely toward the end of a contract? Do you ask your accounts department to pay more attention to those last expense claims inching in before the financial...

Discarded phones present data leak risk

Employees could be unwittingly leaking their workplace's data when disposing of electronic devices, according to research from Proven Legal Technologies.

Is your information governance plan ready for the Internet-of-Things?

Emerging types of data are presenting a significant challenge to the information governance strategies of many businesses.