Insights2020-05-19T12:04:21-04:00

ATTENTION GMAIL USERS: HACKERS CAN EXPLOIT MARKETING EMAILS IN YOUR INBOX – HERE’S HOW TO MITIGATE THIS RISK AND MAKE YOUR GMAIL ACCOUNT MORE SECURE

By Caitlin Counihan, CCO, CCPA, Digital Forensic Analyst The marketing emails arriving in your Gmail inbox are not just a “one way” product advertisement from a marketer – those emails also send information about you back to the marketing company [...]

Tags: |

USING H5 MATTER ANALYTICS: BENEFITS AND COST SAVINGS

By Abbye Needham, Esq., eDiscovery Services Manager H5 Matter Analytics (“H5MA”) is a Relativity integrated application that uses advanced data analytic algorithms to streamline electronic document review by dramatically reducing the number of documents the team needs to review, resulting [...]

Tags: |

TECHNOLOGY-ASSISTED REVIEW FOR PRIVILEGE REVIEW QUALITY CONTROL AND COST SAVINGS

By Beth Hughes, Esq. With the dramatic rise in document review costs as more and more electronic data is created in the ordinary course of business, technology is increasingly necessary to manage the process and associated expenses. The use of [...]

Tags: |

DOES THE FIFTH AMENDMENT PREVENT THE COMPELLED DISCLOSURE OF A PASSWORD TO AN ELECTRONIC DEVICE? – A TECHNICAL PERSPECTIVE

By Freddie C. Dyroff IV, CCPA, CBE Can a court compel you to provide your password to government authorities? Does the type of password you use result in a different answer? With encryption methods becoming ever more entangled with a person’s being, and [...]

Tags: |

BIT-X-BIT PROVIDES VALUABLE CONTRIBUTIONS TO VERIZON’S 13TH ANNUAL DATA BREACH INVESTIGATIONS REPORT

Verizon recently released its highly anticipated 13th annual Data Breach Investigations Report (“DBIR”), containing a comprehensive data-driven review and analysis of the past year’s major cybersecurity events. As a leader in the field of cybersecurity services and incident response, bit-x-bit [...]

Tags: |