Network Management

Three Ways to Protect Your Data From Former Employees

With cloud-based information systems on the rise and sensitive data storage becoming increasingly digital, it has never been more important to ensure your classified company data is protected during employee transitions. Here, the data forensics specialists at Atlantic Data Forensics explain three ways to protect your company data from former employees. Increase Monitoring of Your…

Read More

Preventing Healthcare Database Breaches

Quite alarmingly, there were 2,181 healthcare data breaches between October 2009 and 2017, according to the HIPAA journal. Many of these data breaches had a significant impact on their respective healthcare organizations and many may have been preventable if a proactive, updated data security system was utilized. Here, the data forensics specialists at Atlantic Data…

Read More

An Overview of Digital Piracy

Digital piracy is the illegal distribution of copyrighted materials. Legal issues involving companies like Napster have raised questions about the legality of peer-to-peer sharing, which is often how digital piracy occurs, and the European Union has attempted to pass sweeping legislation which they claim will crack down on the issues of digital piracy and copyright…

Read More

Legal Considerations Regarding Smartphone Use for Businesses

Most businesses have accepted the use of smartphones in the workplace as an inevitable part of doing business in the digital age. With this use comes, however, a need to establish and understand the legal ramifications of personal or company-issued smartphone use by employees. Here, the computer forensics experts at Atlantic Data Forensics provide guidance…

Read More

Addressing the Vulnerability of the Internet of Things

  The Internet of Things (IoT) is something we have previously discussed in terms of computer forensics. This complex and diverse network of little devices known simply as the Internet of Things, is becoming more and more prevalent not only in American homes, but also in American business. The challenge of securing the Internet of…

Read More

Integrating New Technology into Your Network

  Whether you’re adding a new computer or even something as small as a tablet, you’re going to need to make sure that your new device is properly integrated into your network. Without proper integration, you run the risk of unnecessary complexity, which could lead to an insecure environment. Today we’re going to talk about…

Read More

7310 Esquire Ct
Suite 5B
Elkridge, MD 21075

410.540.9000

8996 Parent ST
Livonia, MI 48150
734.744.5794

888 Emerald Drive
Windsor, CO 80550
970.460.9153

FROM TWITTER

@atlanticdf

- 1 day ago

Cease and desist orders are an effective method of recourse when you discover that another individual or business h… https://t.co/Jn0bhqhL1P
h J R