Insights2020-05-19T12:04:21-04:00

DOES THE FIFTH AMENDMENT PREVENT THE COMPELLED DISCLOSURE OF A PASSWORD TO AN ELECTRONIC DEVICE? – A TECHNICAL PERSPECTIVE

By Freddie C. Dyroff IV, CCPA, CBE Can a court compel you to provide your password to government authorities? Does the type of password you use result in a different answer? With encryption methods becoming ever more entangled with a person’s being, and [...]

Tags: |

BIT-X-BIT PROVIDES VALUABLE CONTRIBUTIONS TO VERIZON’S 13TH ANNUAL DATA BREACH INVESTIGATIONS REPORT

Verizon recently released its highly anticipated 13th annual Data Breach Investigations Report (“DBIR”), containing a comprehensive data-driven review and analysis of the past year’s major cybersecurity events. As a leader in the field of cybersecurity services and incident response, bit-x-bit [...]

Tags: |

ENHANCED X1 TOOL STRENGTHENS SOCIAL MEDIA COLLECTIONS

by John Unice, Esq. In just a few years, the use of information-sharing apps and websites has grown exponentially, invading every aspect of our lives, including the corporate environment. The rise of social media use provides in-house counsel, IT professionals, [...]

Tags: , |

REMOTE WORKING – COVID-19’S DIGITAL THREATS

By Brett Creasy, CCE, CISSP The coronavirus pandemic (Covid-19) has caused changes in the lives of everyone world-wide, including the way many now conduct their day-to-day work. Businesses, educational institutions and governments have quickly adopted remote work policies to adhere [...]

VOICE RECORDING PRIVACY CONCERNS ON SMARTPHONES: CHOOSING TO DISABLE?

Chatting with a voice assistant can be a simple way to finish tasks, such as scheduling appointments or ordering food. Voice assistants can look up information, control smart devices and assist with navigating your driving route. This listening technology is [...]

Tags: , |

OBTAINING ENCRYPTED APPLE DEVICE BACKUP DATA FOR INVESTIGATIONS OR LITIGATION

iPhone, iPad and iPod touch users have many ways of keeping their data within reach and accessible. Most commonly, users copy and save data and information from their devices by creating a backup.  This is typically performed when transferring current [...]

Tags: |