Data from a computer or mobile device can be obtained from two different types of sources. The first is persistent data, defined as data that is infrequently accessed and less likely to be modified. The other is volatile data, defined as data that can be found in RAM (random access memory) primarily used for storage…

Read More

With cloud-based information systems on the rise and sensitive data storage becoming increasingly digital, it has never been more important to ensure your classified company data is protected during employee transitions. Here, the data forensics specialists at Atlantic Data Forensics explain three ways to protect your company data from former employees. Increase Monitoring of Your…

Read More

Quite alarmingly, there were 2,181 healthcare data breaches between October 2009 and 2017, according to the HIPAA journal. Many of these data breaches had a significant impact on their respective healthcare organizations and many may have been preventable if a proactive, updated data security system was utilized. Here, the data forensics specialists at Atlantic Data…

Read More

Digital piracy is the illegal distribution of copyrighted materials. Legal issues involving companies like Napster have raised questions about the legality of peer-to-peer sharing, which is often how digital piracy occurs, and the European Union has attempted to pass sweeping legislation which they claim will crack down on the issues of digital piracy and copyright…

Read More

Most businesses have accepted the use of smartphones in the workplace as an inevitable part of doing business in the digital age. With this use comes, however, a need to establish and understand the legal ramifications of personal or company-issued smartphone use by employees. Here, the computer forensics experts at Atlantic Data Forensics provide guidance…

Read More

  The Internet of Things (IoT) is something we have previously discussed in terms of computer forensics. This complex and diverse network of little devices known simply as the Internet of Things, is becoming more and more prevalent not only in American homes, but also in American business. The challenge of securing the Internet of…

Read More

  Whether you’re adding a new computer or even something as small as a tablet, you’re going to need to make sure that your new device is properly integrated into your network. Without proper integration, you run the risk of unnecessary complexity, which could lead to an insecure environment. Today we’re going to talk about…

Read More