Network Management

Persistent Data vs. Volatile Data: What is the Difference?

Data from a computer or mobile device can be obtained from two different types of sources. The first is persistent data, defined as data that is infrequently accessed and less likely to be modified. The other is volatile data, defined as data that can be found in RAM (random access memory) primarily used for storage…

Read More

Three Ways to Protect Your Data From Former Employees

With cloud-based information systems on the rise and sensitive data storage becoming increasingly digital, it has never been more important to ensure your classified company data is protected during employee transitions. Here, the data forensics specialists at Atlantic Data Forensics explain three ways to protect your company data from former employees. Increase Monitoring of Your…

Read More

Preventing Healthcare Database Breaches

Quite alarmingly, there were 2,181 healthcare data breaches between October 2009 and 2017, according to the HIPAA journal. Many of these data breaches had a significant impact on their respective healthcare organizations and many may have been preventable if a proactive, updated data security system was utilized. Here, the data forensics specialists at Atlantic Data…

Read More

An Overview of Digital Piracy

Digital piracy is the illegal distribution of copyrighted materials. Legal issues involving companies like Napster have raised questions about the legality of peer-to-peer sharing, which is often how digital piracy occurs, and the European Union has attempted to pass sweeping legislation which they claim will crack down on the issues of digital piracy and copyright…

Read More

Legal Considerations Regarding Smartphone Use for Businesses

Most businesses have accepted the use of smartphones in the workplace as an inevitable part of doing business in the digital age. With this use comes, however, a need to establish and understand the legal ramifications of personal or company-issued smartphone use by employees. Here, the computer forensics experts at Atlantic Data Forensics provide guidance…

Read More

Addressing the Vulnerability of the Internet of Things

  The Internet of Things (IoT) is something we have previously discussed in terms of computer forensics. This complex and diverse network of little devices known simply as the Internet of Things, is becoming more and more prevalent not only in American homes, but also in American business. The challenge of securing the Internet of…

Read More

Integrating New Technology into Your Network

  Whether you’re adding a new computer or even something as small as a tablet, you’re going to need to make sure that your new device is properly integrated into your network. Without proper integration, you run the risk of unnecessary complexity, which could lead to an insecure environment. Today we’re going to talk about…

Read More

7310 Esquire Ct
Suite 5B
Elkridge, MD 21075

410.540.9000

8996 Parent ST
Livonia, MI 48150
734.744.5794

888 Emerald Drive
Windsor, CO 80550
970.460.9153

FROM TWITTER

@atlanticdf

- 12 days ago

The digital forensics experts at Atlantic Data Forensics discuss the concept of digital forensics integrity, and th… https://t.co/SY6g3rwJgw
h J R