Insights2020-05-19T12:04:21-04:00

Is Your Network Safe from the SolarWinds Breach?

As reported recently by major news outlets such as Reuters, The New York Times, The Washington Post, and others, FireEye, an international cybersecurity company, as well as prominent U.S. government agencies, including the Departments of Treasury, Commerce and Homeland Security, [...]

Tags: , |

ATTENTION GMAIL USERS: HACKERS CAN EXPLOIT MARKETING EMAILS IN YOUR INBOX – HERE’S HOW TO MITIGATE THIS RISK AND MAKE YOUR GMAIL ACCOUNT MORE SECURE

By Caitlin Counihan, CCO, CCPA, Digital Forensic Analyst The marketing emails arriving in your Gmail inbox are not just a “one way” product advertisement from a marketer – those emails also send information about you back to the marketing company [...]

Tags: |

USING H5 MATTER ANALYTICS: BENEFITS AND COST SAVINGS

By Abbye Needham, Esq., eDiscovery Services Manager H5 Matter Analytics (“H5MA”) is a Relativity integrated application that uses advanced data analytic algorithms to streamline electronic document review by dramatically reducing the number of documents the team needs to review, resulting [...]

Tags: |

TECHNOLOGY-ASSISTED REVIEW FOR PRIVILEGE REVIEW QUALITY CONTROL AND COST SAVINGS

By Beth Hughes, Esq. With the dramatic rise in document review costs as more and more electronic data is created in the ordinary course of business, technology is increasingly necessary to manage the process and associated expenses. The use of [...]

Tags: |

DOES THE FIFTH AMENDMENT PREVENT THE COMPELLED DISCLOSURE OF A PASSWORD TO AN ELECTRONIC DEVICE? – A TECHNICAL PERSPECTIVE

By Freddie C. Dyroff IV, CCPA, CBE Can a court compel you to provide your password to government authorities? Does the type of password you use result in a different answer? With encryption methods becoming ever more entangled with a person’s being, and [...]

Tags: |