Subscribe to Blog Updates

IT Group Partner, Tony Sykes, all set to run London Marathon next month

IT Group Instructed to Forensically Examine Managing Director’s Laptop

The Role of Digital Forensics in Tackling 'Crash for Cash' Insurance Fraud

How The New Apple File System Will Impact Forensic Investigations

Does Alexa Hold the Key to Solving Murder Case?

Early Stage Mediation In Information Technology Disputes

How Google Ruined Christmas

Case Study: IT Group Complete Penetration Test and Find a School's Network and Systems to be Completely Insecure

Education Sector Prime Target For Malware Attacks

When Delay Gets Nasty - Micro Mediation

Product Liability and Digital Content: Causation and Coverage - London - Thursday 10 November 2016

IT Group Invest In State Of The Art Cell Site & Call Data Record Analysis Software

Software IP and File Hashing for Obscurity

IT Group Enjoys a Wonderful Evening at the Yorkshire Legal Awards

How Brexit May Impact the TMT Sector

Mini Roundtable - Licensing Disputes

Digital Forensics In Cases of Suspected Insurance Fraud: How Could They Be Used In Investigations?

IT Group Instructed In Insurance Investigation After Break-in at a National Newspaper

e-Disclosure: The Partial Deduplication Dilemma

IT Group Instructed to Examine System & Telecommunication Equipment In Large Insurance Claim

Cyber Crime in Computer Gaming Environments

How Digital Forensics Can Be Used In Family Law Cases

IT Group Achieves ISO 9001 & 27001 Recertification

Mediators in IT Projects

Pokémon Go - Gotta Catch Them All (And Get Your Secrets Too)

Are Databases Intellectual Property? A Common Misconception

Wire Fraud: The Front Line

Intellectual Property and the Lazy Developer

Digital Forensics: Pinning Down Dishonest Employees

Expert Q&A: How to Investigate and Manage a Hack

Hacker Group ‘PoodleCorp’ Claim DDoS Attack Took Pokémon Go Servers Offline

The Yorkshire Legal Awards 2016

Expert reports – too long, too loose? An Expert's opinion

Law Firms Targeted in Recent Wave of Cyber Attacks

The Forgotten Side of Security

Product Liability and Digital Content - Serious Risk or Y2K?

When Hackers Are The Good Guys

Reflecting on the Government’s Cyber Security Report Following TalkTalk Hack

IT Group Locate Tens of Thousands of Documents Stored in Client-side Cache During e-Disclosure Exercise

Menace or Miracle - The Future of Digital Currencies

Software Licensing Dispute? A Properly Conducted Quantum Analysis by Experts Saves 10's of Millions

What's new in Intella Connect? Updates to our e-Disclosure Platform

Rise In Search and Seizure Orders on Ex-Employees Homes

Windows XP Refuses to be Dropped

Project Failure: Think Negative

How Your Mobile Phone Knows Where You've Been

Cyber Security through the Litigation Process

IT Group Expert Interviewed by The Naked Scientists for the BBC

IT Group all set for Tetbury Wacky Races!

How The Technology Disputes Landscape Is Changing

Case Study: Mobile phone analysis proves person was wrongly charged in London assault

IT Group expert to speak at Kemp Little training session on digital asset theft

Case Study:  IT Group partner provides support to mediation regarding IP dispute

Q&A Roundtable: Resolving Technology Disputes

Major Law Firms Targeted by Cyber Criminals

Case Study: Forensic Examination of Corporate File Server

50 Annoying Phrases We Have All Heard At Work

The 7 Most Unusual Cases We Have Been Instructed to Work On

Pawn Storm Group Add Turkey to Their Target List

Case Study: Providing Expert Opinion on a Damaged Electrical Installation

Case Study: Employee Steals Confidential Information to Assist Competing Business

Case Study: Geolocation Analysis Uncovers Ex-Employee Posting Malicious Content Online

Announcement of Head Office Relocation

Google discover flaw that could leave hundreds of thousands of devices vulnerable

Case Study: Rogue Employees Copy Source Code for Rival Company

The Role of a Computer Forensic Expert

Phishing Emails - The Double Bluff

Cyber Reconnaissance & Rise in Whaling Attacks

Cell Site Analysis - The Myths, Lies & Truth

Year in Review: 2015 Highlights and Trends

Q&A Roundtable: Cyber Security and Employee Risks

Ukraine Power Outage the Result of Malicious Malware

Pitfalls in the use of standard Document Management Systems and Search tools to find evidence

Expert Reports: Insurance Disputes and Subrogation

Investigating Employee Theft: Uncovering the Tracks

e-Disclosure – Thinking Big To Work Small

Shop Safely Online This Christmas [Infographic]

Beware! Latest Phishing Email Scam

Case Study: IT Group instructed to conduct cell site analysis of a Blackberry device

Proportionality: Getting to the bottom of high technology expert evidence

Google Timeline: Security, Convenience and Privacy

Q&A: e-Disclosure issues in trade secret identification

Investigating Employee Theft: Curiosity Kills the Evidence

Exit Management Planning for outsourcing agreements

Q&A: Discovery in Disputes

Getting control in an e-Disclosure case

Cyber Security: Mitigating the risks

Real-life Bank Account Fraud - A Forensic Expert's Perspective

An Evening of Glitz and Glamour at the Chambers UK Bar Awards 2015

Intellectual Property Theft : Uncovering the Tracks

IT Group Enjoy Glittering Evening at the Yorkshire Legal Awards 2015

Reoccurring Themes in Technology Disputes

6 Essential e-Disclosure Search Techniques

Confidential Information: Beware the Humble Photocopier

IT Group Sponsor the Yorkshire Legal Awards 2015

Top 10 Tips for Avoiding IT Project Failure

The Insurance Implications of the Internet of Things

IT Group Hosts Race Day at Silverstone

Dial Through Fraud and Phone Hacking

The Challenges of IM applications in a Mobile Forensic Investigation

Source Code Copying

Can Virtual Items Be Stolen?

Case Study: AFD Software v DCML Ltd

The Role of Expert Testimony in Court

The Internet of Things - A Cyber Security Risk Invasion

Mediation: Why It Might Pay to Be a Little More Selfish

Legal Update: New Computer Misuse Act

Keywords and Trade Mark Infringement