Skip to content

Warning: Internet of Things Holds Hidden Dangers

By Rene Novoa, Senior Manager of eDiscovery and Digital Forensics   Law enforcement and civil litigators now have another source of evidence—searching for clues and ESI in the Internet of Things (IoT) universe where “always-on” smart devices may collect and store evidence of criminal behavior or civil liability. Police are investigating…

Cybercrime Forecast: Upswing in 2017

By Michael Hall, Chief Information Security Officer   Computer security threats aren’t going away this year. They’re going to get worse. And, they’re likely to create bigger and nastier problems for big and small companies alike as hackers create new pathways into even highly secure environments. Google the term “security…

Making Good Choices for a Good Recovery

By Mike Cobb, Director of Engineering If you have the misfortune of dealing with a failed data storage device—smartphone, tablet, memory card, hard drive, etc.—what are the most important things you should know before you talk to a data recovery company about the help you need? A fancy website may…

6 Ways to Protect Yourself from Hackers

By Michael Hall, Chief Information Security Officer Data breaches have become an almost predictable problem with banks, major retailers and other businesses around the world, including last month’s news that more than 500 million Yahoo accounts may have been compromised. Properly protecting your personal information greatly reduces the risk of…

Is Pokémon Go a New Target for Hackers?

By Mike Cobb, Director of Engineering Pokémon Go, the smartphone game that became an overnight worldwide sensation, may be more than a cute time-waster. It could provide cybercriminals with an entry point to your business and personal files. Corporate security directors were already wringing their hands over employees who mix…

CSO Online: 4 Signs You’re a Victim of Ransomware

Originally published by CSO Online. …and the 3 steps you need to take next By Amy Bennet The word ransomware conjures images of kidnappers and ransom notes. But that doesn’t quite capture the reality of PC ransomware. In fact, “it’s not always obvious when ransomware is the problem,” says Mike Cobb,…

Little Hits, Big Hacks

By Michael Hall, Chief Information Security Officer If you operate a small company, you may not think your information is valuable enough to be hacked, but you’re wrong. Hackers love small businesses because many do not properly protect their data, making them easier targets to hit. If you are not…

The Key to iPhone Data Recovery

By Mike Cobb, Director of Engineering Hundreds of broken, damaged and malfunctioning iPhones are sent to DriveSavers every month for data recovery. Despite having the best smartphone success rate in the industry, we aren’t able to recover all of them. Many factors are involved, some of which we’ll go into…

Back To Top
Search