|
Volume 4, Issue 2: February 2012 |
Applicant Address Histories
Relying solely on the information provided by the applicant can miss vital information about their suitability for employment. Part of the background investigation should include a Social Security number verification and address history search. Read More... |
When Employees Leave, Data Should Stay
How much time and money could be saved if an image of the computer hard drive had been created before the employee was terminated? We see opportunities for companies to preserve data and protect themselves prior to or as part of the termination procedure itself. Read More... |
Fine Tune Your Criminal Background Checks
The greater the fiduciary responsibility, the more in depth the scope of the screening should be. A professional position should usually require a deeper level of verification and investigation than an entry level position. Read More... |
Clear Your Google Web History
On March 1, 2012, Google will implement a new privacy policy. Under the new policy, your Google Web History can be combined with other data Google has gathered about you from other services like Gmail, Google+, and other services. Read More... |
| You Just Can't Make This Up |
Chinese hackers breached Nortel for years
In this economic climate most of the business resources are focused on delivering the products and services, not on protecting the elements that provide the economic advantage and ultimate return on investment. Read More... |
Eye scanners at England airports turned off
Technology is only as good as the people who will apply it, the compliance of the people it will serve, and the processes in place to help guide its use as a part of a holistic security program. Read More... |
Ask an Expert
Submit your questions on protecting competitive intelligence, background investigations, security systems and technology, training, or anything else related to security and the protection of assets. Questions will be answered by our professionals and posted on our website. Names and identifying information will be kept confidential. Selected questions and answers will also be published in our newsletter. Submit your questions here |