Subscribe to Blog Updates

Expert Q&A: How to Investigate and Manage a Hack

Posted: 26-Jul-2016 09:32:25

IT Group recently took part in a Q&A roundtable for Corporate Disputes magazine entitled 'Investigating and Managing a Hack'. IT Group's Aaron Pickett, alongside Mark Pegram of Sanitas Data Security and Alex Cravero of Kemp Littlediscuss the process of investigating and managing a hack; highlighting some of the key legal and regulatory issues that need to be considered. 

Read More

Hacker Group ‘PoodleCorp’ Claim DDoS Attack Took Pokémon Go Servers Offline

Posted: 22-Jul-2016 15:14:28

Unless you’ve been living under a rock, or far out at sea, it must be impossible for you to have failed to notice the amazing rise to success of Pokémon Go. Within days Nintendo’s share prices rocketed, and the craze has turned out children and adults alike, walking the streets like mobile-holding zombies. Of course, it was not long until someone wanted to spoil the fun – casting millions back into their homes to hide away from the mid-summer heat.

Read More

The Yorkshire Legal Awards 2016

Posted: 20-Jul-2016 12:56:14

IT Group are pleased to be sponsoring the Employment Law Award at the Yorkshire Legal Awards for the second year running.

Hosted by Barker Brooks Communications, publishers of Leeds & Yorkshire Lawyer magazine, the Yorkshire Legal Awards celebrates the very best of the region's legal community.

Read More

Expert reports – too long, too loose? An Expert's opinion

Posted: 14-Jul-2016 12:14:43

A short article published recently on the website sought to criticize expert reports (and therefore the experts that produce them) on the basis that reports are “too long” and “too loose”.

Read More

Law Firms Targeted in Recent Wave of Cyber Attacks

Posted: 12-Jul-2016 15:42:56

Information security, popularly now known as cyber security, is a topical area with repercussions that could potentially affect every business and individual connected to any form of computing system. 

Read More

The Forgotten Side of Security

Posted: 11-Jul-2016 09:28:03

Sometimes, and I’m as guilty as anyone else at this, security is preached and practiced on a daily basis. Update your software; turn on your firewall; install all Operating System upgrades; don’t install strange files; check that emails are genuine. Whilst this is all well and good, there is a large element that remains forgotten – the very bottom and most basic of instructions in the technical web of ‘do and do not’.  I recently attended a conference where the realities of these seemed to show and prove to me that even the most technically-minded forensic examiner needs a reminder every once in a while.

Read More

Product Liability and Digital Content - Serious Risk or Y2K?

Posted: 06-Jul-2016 10:09:14

Tuesday 12 July 2016 | Breakfast Meeting: Product liability and digital content - serious risk or Y2K?

The ‘Internet of Things’ (IoT) is growing at a substantial rate and internet enabled ‘smart objects’ are being used more frequently across a wide range of industries as a means of harnessing vasts amounts of data and intelligence.

Read More