Computer forensics experts

Is Communication Really Safe

In today’s world, there are so many avenues of communication.  We think face to face is the safest, as there are no footprints of the words we speak.  We fax because there isn’t a written line of communication, we talk on our cell phones without ever thinking someone else is listening.  We email without fear because it’s all done electronically.  We text our family, our work, our friends, even businesses private information we think is safe and only that person is receiving it.  Once we hang up, hit send or end button we walk away thinking our communication is safe and secure. That safe and secure world is behind us, we are in the 21st century and technology improves every day.  The same technology that [...]

Investigation Protects Employees and Prevents a Major Bad Decision in a Small Business

One thing we know here at , is that when getting to the truth is a matter of importance, you have to call in professionals – and the sooner the better. Dina’s attorney wasted no time in referring the solopreneur to a professional investigator. In the initial meeting she explained the situation: She had been a solopreneur in her accounting firm for almost five years. Her firm was growing and she started to entertain the idea of adding a partner. When Brett walked through the door looking for a job, it was like he was tailor-made to fit right in with the firm and clientele she had targeted. He was smart, technically proficient, and charming. She hired him on the spot during his first interview. [...]

Is the Purchase of a Smartwatch Setting You up for Digital Forensics Services?

Who do you know with one of the smart, sleek, new smartwatches? Ohhh. So Cool! And so vulnerable to hacking. More so than a smartphone or a tablet. Why? A recent article in the Christian Post explains. According to a recent study by Dr. Frank Breitinger, associate director of the University of New Haven Cyber Forensics Research and Education Group in Connecticut, there is a “lack of encryption and an unsecure authentication system” in all the smartwatches they tested. In the study they tried to infiltrate the devices to get a variety of information such as emails, calendars, messages, health, fitness and financial data. In all cases, if the information was on the device, they were able to get it! Computer forensics experts like those [...]

Go to Top