Go to Top

Blog Archives

Shocking Survey Reveals Only 31% of Organizations are Prepared for a Trade Secret Misappropriation

Baker McKenzie Survey Exposes Board-Level Risks that Companies are NOT Prepared For[1] The Scenario Your client’s IT Director tells his boss that he has observed suspicious behavior on the company’s network. It seems a senior software code designer for the high-speed securities trading company is downloading massive volumes of proprietary trading software code and copying it to a CD burner. Not good. The employee has recently complained about the strategic …Read More

Five Things NOT to do if Infected by Ransomware

Lazarus, Crysis/Dharma, and WannaCry. There were an estimated 638 million ransomware events in 2016, and these attacks are becoming more sophisticated frequent, and effective. Ransomware payments topped $1 billion last year. If ransomware can effectively shut down one of the world’s largest law firms for three days, is any organization safe? We are frequently retained to perform Incident Response digital forensics in ransomware matters, and unfortunately, we often discover that the victim …Read More

Mobile Phone Metadata Proves Insurance Claim for $32K Rolex was Fraud

An inconvenient truth: Photo of “stolen” Rolex was taken 8 days after the alleged theft   The Background One of our recent mobile phone forensics cases illustrates how photo metadata can be an important source of evidence in a wide-array of matters, including insurance fraud cases. The fraudster (let’s call him “Jim”) filed a claim with his insurance company, alleging that his $32K Rolex was stolen from him when he …Read More

WannaCry? Your Law Firm Data Security is Only as Good as Your Weakest Vendor

Recent Ransomware Events Highlight Risks & Your Cyber Insurance Policy May Not Cover Losses The WannaCry incident has created a unique opportunity to examine the potential catastrophic impact of ransomware on businesses, and in particular, business interruption considerations. The following scenario is provided as a way to create discussion opportunities with your clients, IT team, attorneys, and risk managers. The Scenario You’re sitting in your office putting the final touches on a …Read More

How Secure is the Data on Your Mobile Phone?

CBS Chicago News Reporter Dorothy Tucker Interviews 4Discovery’s Jared Sikorski to Find Out   A Startling Scenario You come home from a late night dinner to discover that your home has been burglarized. Fortunately, the police have arrested the suspects after observing them driving erratically with your wide-screen television in their back seat. A lucky break. While interrogating the criminals, police learn that the bad guys entered your home through your …Read More

4Discovery Sponsors Midwest Cyber Security Alliance Ransomware Program

As a show of support for one of the Midwest’s leading information security industry groups, 4Discovery LLC has announced their sponsorship of the May meeting of the Midwest Cyber Security Alliance. This month’s topic: “Are you Prepared for a Ransomware or Business Email Compromise Attack?”  The Midwest Cyber Security Alliance (MCSA), founded by Jennifer Rathburn, a Data Security & Privacy Partner at Foley & Lardner LLP in Milwaukee, exists to help industry practitioners …Read More

Cyberbullying Tragedy: A School District’s Obligations for Capturing Digital Evidence

A Case Study A young student has had enough. After months of relentless and cruel cyberbullying and internet harassment, the girl, in a moment of despondency and depression, ends her life. In the unthinkably sad aftermath, parents, teachers, and loved ones wonder what could have been done to prevent this senseless nightmare. Teachers and middle school administrators are accused, in a lawsuit filed by the dead girl’s parents, of missing …Read More

Ransomware Attack Destroys Years of Police Department Evidence

Are your clients prepared for a ransomware attack? The Background Imagine this scenario…you are a police detective. Early one morning you attempt to access your department’s database as you are working on a very important investigation. When you log in to your computer, you are greeted with a gut-wrenching message: “Your files have been encrypted. Make a Bitcoin payment to unlock your files”. This is the start of a very …Read More

W-2 Fraud: Are Your Clients Prepared for a W-2 “Phishing” Attack?

Tax Season Creates a Spike in These Catastrophic Incidents The Background Your HR Director walks into your office: her face ashen, her voice trembling. Earlier that day, she received an email from the company CFO asking her to email all employee W-2 forms to him. In her typical efficient manner, she complied immediately. The email from the CFO, however, was a phony. It was a “spoof” email sent from a …Read More