Skip to content

Press Release: DriveSavers Meets New SSAE 18 Security Standards

Leader in data recovery, eDiscovery, digital forensics addresses SSAE 18 SOC2 Type II guidelines. DriveSavers, the worldwide leader in data recovery, eDiscovery and digital forensics, announces compliance with new data security requirements added to Standards Organization Controls (SOC) 1 and 2. The American Institute of Certified Public Accountants (AICPA) recently…

Legal Technology Moves Into “IoT” Territory

By Bob Mehr, Sr. Legal Services Advisor Technology is changing today’s legal landscape as courts grapple with a wave of electronic evidence coming from places and things that connect to the Internet. This new evidence is from sources we never imagined would be admissible, including smartphones, doorbells, virtual assistants and…

Petya/ExPetr was Data Killer, Not Ransomware

By Michael Hall, Chief Information Security Officer The malware attack that started in Eastern Europe in late June and quickly spread around the globe looks like it was not a ransom attack at all, but an all-out effort to destroy data, according to a security company that examined the program’s…

Ransomware Takes a New Turn—How WannaCry was Different

By Michael Hall, Chief Information Security Officer Last month, the ransomware known as WannaCry spread through the world at an astonishing rate, attacking hundreds of thousands of computers literally overnight and holding their data for ransom. In 2016, ransomware cost its victims approximately $1 billion. That’s $1 billion for all…

Digital Forensic Process—Preservation / Collection

By John Ahearne, Forensic Analyst This article is part of a series that delves into each step of the digital forensic process. If you missed one of the previous articles, you can read them at the links below: Digital Forensic Process—Introduction Digital Forensic Process—Identification Handling Digital Evidence Handling of evidence…

Digital Forensics Process—Identification

  By Rene Novoa, Senior Manager of eDiscovery and Digital Forensics Identification is an extremely important first step in the forensic examination process. It directly impacts efforts to develop a plan of action and ultimately the success of the project. It also allows the customer to control cost. Identification Before…

Digital Forensic Process—Introduction

By Rene Novoa, Senior Manager of eDiscovery and Digital Forensics More and more aspects of our daily lives are being monitored, tracked and recorded by electronic devices. Today, computers, smartphones and tablets can be found in almost every home and have already become obvious sources of electronically stored information (ESI)…

Warning: Internet of Things Holds Hidden Dangers

By Rene Novoa, Senior Manager of eDiscovery and Digital Forensics   Law enforcement and civil litigators now have another source of evidence—searching for clues and ESI in the Internet of Things (IoT) universe where “always-on” smart devices may collect and store evidence of criminal behavior or civil liability. Police are investigating…

Cybercrime Forecast: Upswing in 2017

By Michael Hall, Chief Information Security Officer   Computer security threats aren’t going away this year. They’re going to get worse. And, they’re likely to create bigger and nastier problems for big and small companies alike as hackers create new pathways into even highly secure environments. Google the term “security…

Back To Top
Search