4Discovery case studies highlight the events, actions, and outcomes in cases we support. The case study below of a project concluded in Q1 of 2022 dives into the steps taken in a trade secret matter. The Issue The owner of...
People are a company’s greatest asset — or are they? In today’s technology-driven world, a company’s greatest assets lie in its digital data and collateral. And although losing employees can be difficult to manage, nothing is more crippling to an...
Want to learn how to help your clients protect their trade secrets? JOIN US FOR A VERY SPECIAL CLE EVENT: Trade Secret Protection – Using Technology to Safeguard Your Most Valuable Assets When? Wednesday, February 7, 2018 Where? The Columbia...
Baker McKenzie Survey Exposes Board-Level Risks that Companies are NOT Prepared For[1] The scenario Your client’s IT Director tells his boss that he has observed suspicious behavior on the company’s network. It seems a senior software code designer for the...
Think Halloween is scary? How about a hacker shutting down your pacemaker? The Chief Information Security Officer of the Year Award Breakfast is always a great opportunity to learn more about what is keeping elite CISOs up at night. The...
“Sorry…You Are Locked Out of Your Own Data” Well, it happened again today. We had to call a client and advise them that it will be nearly impossible, or at least very expensive to perform a forensic exam of one...
Recent Law Firm Data Breaches are Reigniting This Debate Cyber attacks against some of the country’s top law firms are creating fresh concerns about protecting client data, and when lawyers should advise their clients that a breach has occurred. The...
Engineer’s Guilty Plea for Deleting Text Messages Stands Out in a Series of Not Guilty Findings In the months following the 2010 BP Deepwater Horizon oil rig disaster, 52 criminal counts were filed against 5 men that prosecutors believed were...
Hackers Busted Selling Press Releases to Traders – How Secure is Your Vendor’s Info Security? In light of the rash of data security events in the last few years, your company has invested heavily in upgraded security hardware and...
Tablets and Smart Phones Have Out-Shipped Laptops for the First Time Ever Mobile device use in the workplace is changing the landscape of Computer Forensics and Electronic Discovery like never before. The opportunities for investigators and litigation attorneys are significant,...