Most employers will conduct pre-employment checks on people who are applying to work with their company. The process varies but will almost certainly include a right to work check, along with checks into everything from social media use to credit checking. There aren’t many rules and laws around pre-employment checks, but one generally accepted policy is to get consent from…
It’s a buyers’ market when it comes to job hunting at the moment, with dozens – or even hundreds – of people applying for each vacancy, how do you weed out the people who are worth employing from the ones who don’t make the grade? Recruitment is expensive and time-consuming, and making the wrong decision can leave you with other…
Employers are increasingly demanding proof of academic qualifications for the people they hire. Most jobs will now specify a minimum of GCSE qualifications in English and Maths, and for higher level positions there may be a requirement for a specific degree or qualification. But with some surveys suggesting as many as 85% of people lie on their CVs, how can…
Like its namesake from ancient Greek history, a Trojan Horse presents itself in a harmless form, lulling its victims into a sense of false security. The original malware miscreant, it is a decoy, ushering in malicious software that can often go undetected. Do Trojan Horses attack personal computers? As long as you have information that is of interest to the…
Stealing your personal details to gain access to your well-earned money is a crime that has gained sophistication rapidly in recent times helped along with the advent of online activity. Just when we were getting wise to dumpster diving, shoulder surfing and skimming, we are now faced with a new onslaught, exclusive to the internet. The internet is fast becoming…
Identity theft is when your personal details are stolen and to be used in illicit dealings such as accessing your funds, applying for credit in your name and ordering goods online using your card details. Going through your rubbish, known as “dumpster diving” is old hat because these days criminals don’t have to get their hands dirty to steal your…
Personal identity theft is viewed as a serious offence and if you are victim to this, you should waste no time in reporting it to the relevant authorities. This type of theft is when a fraudster, often online offenders nowadays, obtains your personal identity and financial information to make unauthorised transactions on purchases and to remotely remove money from your…
Falling victim to a “hack attack” is a real danger for those of us who rely heavily on our devices – from smartphones to PCs. Hacking is a term most of us are all too familiar with, but would we be able to recognise the signs that our devices have been hacked? If you suspect you are a victim of…
For any businesses or non-commercial organisation wanting to reach out to potential customers or clients via a digital onboarding experience, there really is only one chance to get account opening right. Failure to do so will result in an individual associating a brand – whatever it may be – with a bad experience. Even if they stick with it (perhaps…
Malware is a new word created by the tech industry, which describe a certain class of malicious applications that play havoc with our computer systems and mobile devices. Similar to spyware or adware, malware is a particular type of tool used by cybercriminals to gain access to your computer to make it perform a function that is often aimed at…