Go to Top

Advisories

You’re Invited to a Very Special CLE Certified Event!

ARE YOUR CLIENTS PREPARED FOR A RANSOMWARE ATTACK? Ransomware has become a significant and growing business risk. Due to the lucrative nature of ransomware, the “industry” is growing in size and sophistication, and the criminals’ techniques are becoming more effective. Currently, ransom demands of $25,000 and above are commonplace, and that cost is likely to continue to increase in the future. If one of your clients suffered a ransomware attack, would you …Read More

Cyberbullying Tragedy: A School District’s Obligations for Capturing Digital Evidence

A Case Study A young student has had enough. After months of relentless and cruel cyberbullying and internet harassment, the girl, in a moment of despondency and depression, ends her life. In the unthinkably sad aftermath, parents, teachers, and loved ones wonder what could have been done to prevent this senseless nightmare. Teachers and middle school administrators are accused, in a lawsuit filed by the dead girl’s parents, of missing …Read More

Ransomware Attack Destroys Years of Police Department Evidence

Are your clients prepared for a ransomware attack? The Background Imagine this scenario…you are a police detective. Early one morning you attempt to access your department’s database as you are working on a very important investigation. When you log in to your computer, you are greeted with a gut-wrenching message: “Your files have been encrypted. Make a Bitcoin payment to unlock your files”. This is the start of a very …Read More

W-2 Fraud: Are Your Clients Prepared for a W-2 “Phishing” Attack?

Tax Season Creates a Spike in These Catastrophic Incidents The Background Your HR Director walks into your office: her face ashen, her voice trembling. Earlier that day, she received an email from the company CFO asking her to email all employee W-2 forms to him. In her typical efficient manner, she complied immediately. The email from the CFO, however, was a phony. It was a “spoof” email sent from a …Read More

Phishing Update: The Bad Guys Are Getting More Sophisticated – And Losses Are Way Up

More Bad News…Your Loss From Phishing Fraud May Not Be Covered By Insurance Phishing scams are not new, but losses from these social engineering ploys are increasing dramatically as the fraudsters become more convincing in their techniques.  Indeed, this was one of the primary themes of this year’s Net Diligence Cyber Insurance conference in Santa Monica, California. It’s Getting Ugly Out There… The FBI estimates phishing attacks have cost organizations …Read More

Is Your Data Secure In Our ‘Internet Of Things’ World?

Think Halloween is scary?  How about a hacker shutting down your pacemaker? The Chief Information Security Officer of the Year Award Breakfast is always a great opportunity to learn more about what is keeping elite CISOs up at night.  The annual event brings together a who’s who of the most talented information security executives from America’s best companies.  This year’s program was no exception, and we were honored to be …Read More

Social Media and E-Discovery CLE Offering

Schedule Your Next CLE Event With 4Discovery! Bringing electronic discovery knowledge to you… Looking for a convenient way to complete your mandatory CLE requirements? Would you like to achieve CLE credits in the convenience of your office? Concerned about compliance with rapidly changing electronic discovery technology? 4Discovery provides on-site CLE programs in the convenience of your law firm’s conference room… Who?  Any attorneys handling cases in which social media content …Read More

Hillary Clinton’s eMail Drama: Tips From the Trenches

I am in the digital forensics business.  That means that when something related to eMail or computer evidence is in the news, my friends and family ask me questions, like:  “are Tom Brady’s destroyed “DeflateGate” text messages recoverable?”, and “could you recover data from the submerged mobile phones from missing Malaysian Airlines Flight 370 if it was ever recovered?”  So, I get used to these questions.  It’s kind of fun. …Read More

Retweet Case Raises Free Speech Debate

Can a person be held criminally responsible for “Retweeting” another person’s content, or is such communication protected under The First Amendment’s “Free Speech” language? Communication in our electronic world is bending a number of legal concepts into strange new shapes. Consider Safya Roe Yassin, a 39-year-old citizen that was recently arrested for conspiracy and transmitting threats over state lines.  Her alleged crime?  Retweeting twitter posts from a third party that …Read More

Chicago-Based Digital Forensics Firm 4Discovery Sponsors 2016 CISO of the Year Program

As a show of support for one of the information security industry’s most important leadership initiatives, 4Discovery LLC has announced their sponsorship of the 2016 CISO of the Year Program. In its fourth year, the CISO of the Year Award has been established to publicly recognize top senior information security leaders who hold an increasingly important role in the corporate and social leadership environments for the companies they represent.  The …Read More