Cybersecurity Considerations when Dealing with Cryptocurrency

Cryptocurrencies are meant to protect users from fraud due to their decentralized and anonymized transactions, but this type of currency can still be vulnerable to certain types of fraud, scams or risks. Here, the cybersecurity and computer forensics experts at Atlantic Data Forensics discuss some cybersecurity considerations cryptocurrency traders and users should implement when buying,…

Read More

Steps to Properly Handle a Workplace Investigation

In the event that an incident or wrongdoing occurs at your company, such as employee theft, harassment or drug abuse, fast and effective action is necessary to mitigate the situation and avoid liability. Here, the computer forensics specialists at Atlantic Data Forensics detail the important steps you should take during a proper workplace investigation. When…

Read More

Can Smartphones be Used in the E-Discovery Process?

With the number of individuals owning a smartphone in 2019 expected to reach 2.5 billion, the legal industry cannot overlook the tremendous role of smartphones in the modern e-discovery process. Here, the data forensics specialists at Atlantic Data Forensics explain how smartphones can be used to collect incriminating evidence during legal investigations. Smartphones Transform the…

Read More

How Computer Forensics Can be Used to Investigate Employee Data Theft

Statistics show that, alarmingly, over one quarter of employees steal proprietary information when leaving a company or organization. Whether these departing employees feel a certain sense of ownership over the data they choose to steal, or they intend to use the information to undermine the company, it is important to understand the legal consequences of…

Read More

Legal Hold and the E-Discovery Process

A litigation hold, also known as a legal hold, is the process in which an organization involved in litigation advises its personnel of information that may need to be preserved for potential investigation. Here, the Maryland data forensics specialists at Atlantic Data Forensics explain the legal hold as an important step of the e-discovery process.…

Read More

An Overview of Social Media Discovery

With the prevalent use of social media, it is inevitable that those facing litigation, whether they be the plaintiff or defendant, will likely be required to provide access to some amount of social media content during discovery. Here, the data forensics experts at Atlantic Data Forensics detail key information about social media discovery. There Has…

Read More

Computer Forensics: Recovering Deleted Files

Recovering deleted files is an important job of a data forensic specialist, as an essential part of many computer forensics investigations is retrieving deleted files that could be used as evidence. Here, the data forensics experts at Atlantic Data Forensics provide an overview of the process of recovering deleted files for both files deleted accidentally,…

Read More

Atlantic Data Forensics What to Know About Phishing Attacks

According to “The State of the Phish ReportTM 2018,” approximately 76% of information-security professionals revealed that their organization experienced a phishing attack in 2017. Phishing attacks are a serious issue for businesses of all sizes and in all sectors, but the damage they cause can be mitigated or avoided entirely through an understanding of how…

Read More

Real-World Implications of Computer Forensics: ​The Purge Lawsuit

Universal Pictures, Platinum Dunes Productions and screenwriter James DeMonaco are currently in the midst of a copyright lawsuit based on the dystopian-thriller franchise “The Purge”. Recently, new developments from the plaintiff, Douglas Jordan-Benel, may show that emails provided in discovery by the defense were manipulated. Here, the digital forensic experts at Atlantic Data Forensics discuss…

Read More

Data Forensics and Cloud Computing: Dropbox, Google Drive and OneDrive Data Sensitivity

Cloud computing has recently grown in popularity as a method of storing data. Services such as Dropbox, Google Drive and OneDrive are commonly used for their flexibility and cost-effectiveness which allow businesses to store and share their information with ease. However, with the convenience of use provided to businesses by cloud computing services comes new…

Read More

7310 Esquire Ct
Suite 5B
Elkridge, MD 21075

410.540.9000

8996 Parent ST
Livonia, MI 48150
734.744.5794

888 Emerald Drive
Windsor, CO 80550
970.460.9153

FROM TWITTER

@atlanticdf

- 1 day ago

Cease and desist orders are an effective method of recourse when you discover that another individual or business h… https://t.co/Jn0bhqhL1P
h J R