Skip to content

Digital Forensics Process—Identification

  By Rene Novoa, Senior Manager of eDiscovery and Digital Forensics This article is part of a series that delves into each step of the digital forensic process. If you missed the introduction to the series, which provides a synopsis of the process as a whole, you can click here…

RAID Spring Cleaning Tips

By Mike Cobb, DriveSavers Director of Engineering April is officially Spring Cleaning Month. Take some time to pay a little attention to your servers with some important maintenance. How many of these suggestions do YOU already follow? Is there anything you’ve missed? Back Up (obviously) We always recommend triple redundancy,…

Digital Forensic Process—Introduction

By Rene Novoa, Senior Manager of eDiscovery and Digital Forensics More and more aspects of our daily lives are being monitored, tracked and recorded by electronic devices. Today, computers, smartphones and tablets can be found in almost every home and have already become obvious sources of electronically stored information (ESI)…

Tips to Increase the Life of your Solid State Drive

By Mike Cobb, Director of Engineering Give it Some Space Filling your drive to capacity will likely cause performance to suffer. Fill to no more than 85% capacity and leave 15–25% empty. At least 15% free space is needed for disk caching and self-maintenance. The computer needs to use disk space…

Danger Lurking Inside Smart Houses

By Michael Hall, Chief Information Security Officer If the advanced technology in our everyday lives was directed against us, who would win in a battle pitting humanity against smart machines? If you consider the rapid rise of the Internet of Things (IoT), this imagined scene isn’t as farfetched as you…

Another Crafty Phishing Attack Example

By Michael Hall, Chief Information Security Officer We like to keep you informed any time we come across a new scam or hack that may result in data loss or data theft. We’ve recently seen a new type of phishing email that is quickly becoming very common. This spoof email…

Warning: Internet of Things Holds Hidden Dangers

By Rene Novoa, Senior Manager of eDiscovery and Digital Forensics   Law enforcement and civil litigators now have another source of evidence—searching for clues and ESI in the Internet of Things (IoT) universe where “always-on” smart devices may collect and store evidence of criminal behavior or civil liability. Police are investigating…

Cybercrime Forecast: Upswing in 2017

By Michael Hall, Chief Information Security Officer   Computer security threats aren’t going away this year. They’re going to get worse. And, they’re likely to create bigger and nastier problems for big and small companies alike as hackers create new pathways into even highly secure environments. Google the term “security…

Hybrid and Fusion Drives Explained

Image: Flicker By Mike Cobb, Director of Engineering To get the best of the past and the future in storage technology, look no further than hybrid and Fusion drives. These are both complex storage solutions that combine two completely different technologies to give customers more speed with larger capacity. Hybrid…

eDiscovery: A Look Back at 2016 and Forward to 2017

By Bob Mehr, Sr. Legal Services Advisor Looking Back: 2016 A number of Federal Rules of Civil Procedure (FRCP) amendments went into effect in 2015, a couple of which, FRCP Rules 26(b) and 37(e) brought more significant change in the realm of discovery than has been seen in decades. These changes…

Back To Top
Search